Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
Robert Caddell AtkinsonUniversity of StrathclydeVerified email at strath.ac.uk
Christos TachtatzisUniversity of StrathclydeVerified email at strath.ac.uk
Hanan HindyComputer Science Department, Faculty of Computer and Information Sciences, Ain Shams UniversityVerified email at cis.asu.edu.eg
Amar SeeamCentre for African Smart Public Value Governance (C4SP)Verified email at c4sp.org
Ethan BayneAudit ScotlandVerified email at audit-scotland.gov.uk
Miroslav BuresCzech Technical University In PragueVerified email at fel.cvut.cz
David BROSSETFrench naval academy research institute, Arts et Métiers Science & Technology, Naval cyberdefenceVerified email at ecole-navale.fr
Andrew HamiltonUniversity of GlasgowVerified email at glasgow.ac.uk
Ivan AndonovicUniversity of StrathclydeVerified email at strath.ac.uk
Lynsay A. ShepherdReader, Abertay UniversityVerified email at abertay.ac.uk
Arnau ErolaResearcher, Department of Computer Science, University Of OxfordVerified email at cs.ox.ac.uk
Elike HodoPhD student, University of StrathclydeVerified email at rmu.edu.gh
Mohamed Ben FarahSenior Lecturer in Cyber Security, Birmingham City UniversityVerified email at bcu.ac.uk
Carsten MapleProfessor of Cyber Systems Engineering, University of WarwickVerified email at warwick.ac.uk
Ephraim IorkyasePhD in Application of Machine Learning, University of Strathclyde, UKVerified email at strath.ac.uk
Bestoun S. AhmedProfessor in Computer Science, Karlstad UniversityVerified email at kau.se
Preetila SeeamUniversity of MauritiusVerified email at uom.ac.mu
Craig MichieProfessor, University of StrathclydeVerified email at strath.ac.uk
Shivanand GunessUniversity of KentVerified email at kent.ac.uk
Elochukwu UkwanduLecturer in Computer Security, Cardiff School of Technologies, Cardiff Metropolitan UniversityVerified email at cardiffmet.ac.uk