Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Maher AlharbyAssistant Professor at Taibah UniversityVerified email at taibahu.edu.sa
Mohammad AlauthmanUniversity of Petra, Faculty of Information TechnologyVerified email at uop.edu.jo
Ahmad al-QeremZarqa UniversityVerified email at zu.edu.jo
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Maryam MehrnezhadAssociate Professor, Information Security Group (ISG) Royal Holloway University of London, Egham, UKVerified email at rhul.ac.uk
Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityVerified email at hu.edu.jo
Ellis SolaimanSenior Lecturer / Associate Professor, Newcastle University (SFHEA, FBCS)Verified email at ncl.ac.uk
Paul EzhilchelvanReader, School of Computing, Newcastle UniversityVerified email at ncl.ac.uk
Roben Castagna LunardiAssociate Professor, Federal Institute of Education, Science and Technology of Rio Grande do SulVerified email at lunardi.inf.br