Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Roel WieringaUniversity of TwenteVerified email at utwente.nl
- Dr. Asma AdnaneSenior Lecturer, Loughborough UniversityVerified email at lboro.ac.uk
- Andrew MarringtonDean of Academic Affairs, Zayed UniversityVerified email at zu.ac.ae
- Farhan AhmadUniversity of Huddersfield, UKVerified email at hud.ac.uk
- Pascal van EckSoftware Improvement GroupVerified email at pascalvaneck.com
- Fatih KurugolluProfessor, University of SharjahVerified email at sharjah.ac.ae
- Noora Al MutawaDubai Police - University of Central LancashireVerified email at uclan.ac.uk
- Yijun YuThe Open UniversityVerified email at open.ac.uk
- Thein Than TunResearch Associate, The Open UniversityVerified email at open.ac.uk
- Dr. Muhammad Shahroz Nadeemlecturer in Computing / Cyber Security University of Suffolk, U.K.Verified email at uos.ac.uk
- Bashar NuseibehThe Open UniversityVerified email at open.ac.uk
- Lu LiuUniversity of LeicesterVerified email at leicester.ac.uk
- Xiaojun ZhaiUniversity of EssexVerified email at essex.ac.uk
- Janet C ReadUniversity of Central LancashireVerified email at uclan.ac.uk
- Ralf Luis de MouraProfessor, Pesquisador e Arquiteto Corporativo ValeVerified email at vale.com
- Maya DanevaAssociate Professor of Computer Science, University of TwenteVerified email at utwente.nl
- Gustavo PessinInstituto Tecnológico ValeVerified email at itv.org
- Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at warwick.ac.uk
- Nelly Condori FernandezUniversidad Santiago de CompostelaVerified email at usc.es
- Marian DugganReader in Criminology, University of Kent, CanterburyVerified email at kent.ac.uk