Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
HS VenterProfessor and HoD of Computer Science, University of PretoriaVerified email at cs.up.ac.za
Nickson M. KarieCyber Security and Forensics Researcher - Edith Cowan UniversityVerified email at ecu.edu.au
Richard Adeyemi IkuesanComputing and Applied Technology, College of Technological Innovation, Zayed University, Abu DhabiVerified email at zu.ac.ae
SADI ALAWADIPostDoc, Uppsala University, SwedenVerified email at it.uu.se
Indrakshi RayProfessor of Computer Science, Colorado State UniversityVerified email at cs.colostate.edu
Jan A. PerssonMalmö HögskolaVerified email at mau.se
Feras AwayshehAssistant Professor of Big Data Systems, institute of Computer Science, the University of TartuVerified email at ut.ee
Joseph BugejaPostdoc in Computer Science at Malmö UniversityVerified email at mau.se
David DampierInterim Dean, College of Engineering and Computer Sciences, Marshall UniversityVerified email at marshall.edu
Carl Magnus OlssonAssociate Professor of Computer Science, Malmö UniversityVerified email at mau.se
Craig ValliSafeNSecureCyberVerified email at safensecurecyber.com
Wencheng YangEdith Cowan UniversityVerified email at ecu.edu.au
Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, Atlanta, USAVerified email at kennesaw.edu
Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
Mehdi SookhakTexas A&M University-Corpus ChristiVerified email at ieee.org
Manuel Fernández DelgadoUniversity of Santiago de CompostelaVerified email at usc.es
George GrisposAssistant Professor in Cybersecurity at University of Nebraska-OmahaVerified email at unomaha.edu
Yuji DongXi'an Jiaotong Liverpool UniversityVerified email at xjtlu.edu.cn
Ian HartleyLancaster UniversityVerified email at lancaster.ac.uk
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San Antonio; Highly Cited Researcher 2020, 2021Verified email at utsa.edu