Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Dr.Mohammed AlreshoodiAssociate Professor at Qassim University, Saudi ArabiaVerified email at qu.edu.sa
- Stuart WalkerProfessor, Essex UniversityVerified email at essex.ac.uk
- Martin FleuryUniversity of Essex, UKVerified email at essex.ac.uk
- Laith Al-JobouriUniversity of EssexVerified email at essex.ac.uk
- John WoodsSenior Lecturer Essex UniversityVerified email at essex.ac.uk
- Bander A. AlzahraniProfessor of Cybersecurity at King Abdulaziz UniveristyVerified email at kau.edu.sa
- Jeevan PokhrelLead Data Scientist, RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au
- Louis CliftSenior Specialist Technician, University of EssexVerified email at essex.ac.uk
- James OrwellProfessor of Computer Science, Kingston UniversityVerified email at kingston.ac.uk
- Mujtaba MehdiKingston UniversityVerified email at kingston.ac.uk
- Maria G MartiniProfessor, Kingston University LondonVerified email at kingston.ac.uk