Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
George GrisposAssistant Professor of Cybersecurity - University of Nebraska at OmahaVerified email at unomaha.edu
Tim StorerSenior Lecturer in Software Engineering, School of Computing Science, University of GlasgowVerified email at glasgow.ac.uk
J. Todd McDonaldUniversity of South AlabamaVerified email at southalabama.edu
Ryan BentonUniversity of South AlabamaVerified email at southalabama.edu
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Andrew BlythUniversity of South walesVerified email at southwales.ac.uk
Leif AzzopardiUniversity of StrathclydeVerified email at strath.ac.uk
Gobinda ChowdhuryProfessor, Department of Computer & Information SciencesVerified email at strath.ac.uk
Majd Zuhair TahatInstructor of Computer Science, Louisiana Tech UniversityVerified email at latech.edu
Follow![William Bradley Glisson](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=gUnW9JcAAAAJ&citpid=4)