Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Nathan ClarkeProfessor of Cyber Security & Digital Forensics, University of PlymouthVerified email at plymouth.ac.uk
- Steven FurnellUniversity of NottinghamVerified email at nottingham.ac.uk
- Paul Haskell-DowlandEdith Cowan UniversityVerified email at ecu.edu.au
- Maria PapadakiAssociate Professor in Cyber Security, University of DerbyVerified email at derby.ac.uk
- ABDULRAHMAN ALRUBANAssistant Professor | AI ConsultantVerified email at mu.edu.sa
- Hussam J. MohammedUniversity of AnbarVerified email at uoanbar.edu.iq
- Adéle da Veiga (Martins)School of Computing, UnisaVerified email at unisa.ac.za
- Jose Oscar FajardoResearch Staff, University of the Basque Country (UPV/EHU)Verified email at ehu.es
- Fidel LiberalUniversity of the Basque Country (UPV/EHU)Verified email at ehu.es
- Stavros ShiaelesAssociate Professor in Cyber SecurityVerified email at port.ac.uk
- Is-Haka MkwawaUniversity of PlymouthVerified email at plymouth.ac.uk
- Lingfen SunReader (Associate Professor) in Multimedia Communications and Networks, University of PlymouthVerified email at plymouth.ac.uk
Follow
Fudong Li
Senior Lecturer in Cyber Security, Bournemouth University, UK
Verified email at bournemouth.ac.uk