Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthEmail verificata su plymouth.ac.uk
Maria PapadakiAssociate Professor in Cyber Security, University of DerbyEmail verificata su derby.ac.uk
Paul Haskell-DowlandEdith Cowan UniversityEmail verificata su ecu.edu.au
Andy PhippenBournemouth universityEmail verificata su bournemouth.ac.uk
Fudong LiSenior Lecturer in Cyber Security, Bournemouth University, UKEmail verificata su bournemouth.ac.uk
Weizhi MengProfessor, Lancaster University, United KingdomEmail verificata su lancaster.ac.uk
Matthew WarrenRMIT UniversityEmail verificata su rmit.edu.au
Georgios MagklarasSteelcyber Scientific and Norwegian Meteorological InstituteEmail verificata su met.no
Nor Badrul AnuarProfessor of Network and Cybersecurity, University of MalayaEmail verificata su um.edu.my
Dr. Nader Sohrabi safaUniversity of WolverhamptonEmail verificata su warwick.ac.uk
Rossouw Von SolmsNelson Mandela UniversityEmail verificata su nmmu.ac.za
Bogdan GhitaUniversity of PlymouthEmail verificata su plymouth.ac.uk
Christoph ReichProfessor of Computer ScienceEmail verificata su hs-furtwangen.de
Phil BrookeGreen Pike LtdEmail verificata su green-pike.co.uk
shukor razakUniversiti teknologi malaysiaEmail verificata su utm.my
Ismini VasileiouAssociate Professor | Director of the East Midlands Cyber Security ClusterEmail verificata su dmu.ac.uk
Reinhardt A. BothaProfessor of Information Technology, Nelson Mandela University, Port ElizabethEmail verificata su nmmu.ac.za
Sokratis K. KatsikasProfessor, Dept. of Information Security and Communication Technology, NTNUEmail verificata su ntnu.no
Kerry-Lynn ThomsonNelson Mandela UniversityEmail verificata su mandela.ac.za
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Email verificata su sutd.edu.sg