Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Victor Chang (Data Scientist,Industry 5...Professor of Business Analytics, Aston UniversityVerified email at aston.ac.uk
- Qianwen Ariel XuAston UniversityVerified email at aston.ac.uk
- Karl HallLecturer in Computing & Games, Teesside UniversityVerified email at tees.ac.uk
- Lewis GolightlyLecturer in Cybersecurity and Blockchain at Teesside UniversityVerified email at tees.ac.uk
- Paolo ModestiSenior Lecturer in Cybersecurity, Teesside University, UK, EuropeVerified email at tees.ac.uk
- Anna KobusińskaInstitute of Computing Science, Poznań University of TechnologyVerified email at cs.put.poznan.pl
- Alessandro Di StefanoSenior Lecturer in Computer Science, Teesside University, SCEDT, UKVerified email at tees.ac.uk
- Prof. Zhili SunProfessor of Communication Networking, University of SurreyVerified email at surrey.ac.uk
- Giancarlo FortinoFull Prof. of Computer Engineering, University of Calabria, FIEEE, FAAIA, Highly Cited ResearcherVerified email at unical.it