Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Victor Chang (Data Scientist,Industry 5...Professor of Business Analytics, Aston UniversityEmail verificata su aston.ac.uk
Qianwen Ariel XuAston UniversityEmail verificata su aston.ac.uk
Meghana Ashok GanatraTeesside UniversityEmail verificata su live.tees.ac.uk
Lewis GolightlyLecturer in Cybersecurity and Blockchain at Teesside UniversityEmail verificata su tees.ac.uk
Paolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeEmail verificata su tees.ac.uk
Le Minh Thao DoanTeesside UniversityEmail verificata su tees.ac.uk
Anna KobusińskaInstitute of Computing Science, Poznań University of TechnologyEmail verificata su cs.put.poznan.pl
Chrisina JayneTeesside UniversityEmail verificata su tees.ac.uk
Segui

Karl Hall
Lecturer in Computer Science, Teesside University
Email verificata su tees.ac.uk - Home page