Get my own profile
Co-authors
Rita KopYorkville University, CanadaVerified email at yorkvilleu.ca
Rod McCallLuxembourg Institute of Science and TechnologyVerified email at list.lu
Shaleph O'NeillUniversity of DundeeVerified email at dundee.ac.uk
Michael SmythSchool of Computing, Engineering and the Built Environment, Edinburgh Napier UniversityVerified email at napier.ac.uk
David BenyonProfessor at Edinburgh Napier UniversityVerified email at napier.ac.uk
Reza MontasariSwansea UniversityVerified email at swansea.ac.uk
Edmond PrakashTeesside University London, United KingdomVerified email at tees.ac.uk
Sarah DashtiSscholar, PhD student, Cardiff Metropolitan UniversityVerified email at outlook.cardiffmet.ac.uk
Rhyd LewisSchool of Mathematics, Cardiff UniversityVerified email at cf.ac.uk
Joel PinneyCardiff Metropolitan UniversityVerified email at cardiffmet.ac.uk
Shasha YuClark UniversityVerified email at clarku.edu
Dr Iain McGregorEdinburgh Napier UniversityVerified email at napier.ac.uk
Andres Navarro NewballProfesor Titular, Pontificia Universidad Javeriana Cali, ORCID 0000-0002-4231-8661Verified email at javerianacali.edu.co
Liqaa NawafCardiff Metropolitan UniversityVerified email at cardiffmet.ac.uk
Chaminda Thushara HewageReader in Data Security, Cardiff Metropolitan UniversityVerified email at cardiffmet.ac.uk
Esyin ChewCardiff Metropolitan University, Monash University Malaysia, University of South Wales, UniversityVerified email at cardiffmet.ac.uk
Simon James CropperCHDH, Psychology, University of MelbourneVerified email at unimelb.edu.au
Simon ThorneCardiff School of Technologies, Cardiff Metropolitan UniversityVerified email at cardiffmet.ac.uk
Daniel CunliffeReader, University of South WalesVerified email at southwales.ac.uk
Phil LeggProfessor in Cyber Security, University of the West of EnglandVerified email at uwe.ac.uk