Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- T.L. McCluskeyProfessor of Software Technology, University of HuddersfieldVerified email at hud.ac.uk
- Lukáš ChrpaCzech Technical University in PragueVerified email at cvut.cz
- Falilat JimohNational Information Technology Development AgencyVerified email at nitda.gov.ng
- Mauro VallatiFull Professor, University of HuddersfieldVerified email at hud.ac.uk
- Celestine Iwendi. PhD D.Div SMIEEE...Professor of AI, Head of CIOTH at University of Bolton, United KingdomVerified email at ieee.org
- Dr. Firoz Khan, PhDBall State UniversityVerified email at bsu.edu
- Hamad Al-MohannadiUniversity of BradfordVerified email at student.bradford.ac.uk
- Ahmad Sanda MusaSenior Lecturer at Canterbury Christ Church UniversityVerified email at canterbury.ac.uk
- Simon ParkinsonProfessor, University of Huddersfield & UK Government Cyber Security Advisory Board MemberVerified email at hud.ac.uk
- Peter GregorySenior Research Scientist, Schlumberger Cambridge ResearchVerified email at tees.ac.uk
- Dr.Lakshmana Kumar Ramasamy PD...Faculty of Computer Information Science, Higher Colleges of Technology, United Arab Emirates