Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Roel WieringaUniversity of TwenteVerified email at utwente.nl
- Dr. Asma AdnaneLecturer, Loughborough UniversityVerified email at lboro.ac.uk
- Andrew MarringtonAssociate Professor, Zayed UniversityVerified email at zu.ac.ae
- Farhan AhmadUniversity of Huddersfield, UKVerified email at hud.ac.uk
- Pascal van EckSoftware Improvement GroupVerified email at pascalvaneck.com
- Fatih KurugolluProfessor, University of SharjahVerified email at sharjah.ac.ae
- Noora Al MutawaDubai Police - University of Central LancashireVerified email at uclan.ac.uk
- Yijun YuThe Open UniversityVerified email at open.ac.uk
- Thein Than TunResearch Associate, The Open UniversityVerified email at open.ac.uk
- Dr. Muhammad Shahroz Nadeemlecturer in Computing / Cyber Security University of Suffolk, U.K.Verified email at uos.ac.uk
- Bashar NuseibehThe Open University (UK) & Lero (Ireland)Verified email at open.ac.uk
- Lu LiuUniversity of LeicesterVerified email at leicester.ac.uk
- Xiaojun ZhaiUniversity of EssexVerified email at essex.ac.uk
- Janet C ReadUniversity of Central LancashireVerified email at uclan.ac.uk
- Ralf Luis de MouraProfessor, Pesquisador e Arquiteto Corporativo ValeVerified email at vale.com
- Maya DanevaAssociate Professor of Computer Science, University of TwenteVerified email at utwente.nl
- Gustavo PessinInstituto Tecnológico ValeVerified email at itv.org
- Nelly Condori FernandezUniversidad Santiago de CompostelaVerified email at usc.es
- Olga AngelopoulouDoctor of Philosophy in ComputingVerified email at warwick.ac.uk
- Pedro R. M. Inácio{////} sins-lab, Universidade da Beira Interior and Instituto de TelecomunicaçõesVerified email at di.ubi.pt