Get my own profile
Co-authors
- Manolya Kavakli-ThorneProfessor of Gamification & Simulation Technology, Aston University, UKVerified email at aston.ac.uk
- Iqbal H Sarker, PhDCUET | Swinburne University | Cyber Security CRC | ECU, AustraliaVerified email at ecu.edu.au
- Dr. Gulshan KumarAssociate Professor, Shaheed Bhagat Singh State University, FerozepurVerified email at ptu.ac.in
- Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
- Shahriar BadshaSr. Security Engineer, Bosch USAVerified email at us.bosch.com
- A. S. M. KayesSenior Lecturer in Cybersecurity, Dept of CSIT at La Trobe University, MelbourneVerified email at latrobe.edu.au
- Dr. Nazim Uddin SheikhResearch Fellow, Macquarie University, SydneyVerified email at mq.edu.au
- Syed Md. Minhaz HossainAssistant Professor, Dept of CSE, Premier UniversityVerified email at puc.ac.bd
- Dr. Kutub ThakurPhd Computer Science , Pace UniversityVerified email at pace.edu
- Sohrab HossainAssistant Professor, Department of Computer Science and Engineering, East Delta UniversityVerified email at eastdelta.edu.bd
- Sheikh IkhlaqTechnical Architect Manager at DeloitteVerified email at deloitte.com
- Asif Irshad KhanKing Abdulaziz UniversityVerified email at kau.edu.sa
- Alex Hay-Man Ng (吴希文)Guangdong University of Technology; University of New South WalesVerified email at unsw.edu.au
- Kwok Wai LOThe Chinese University of Hong KongVerified email at cuhk.edu.hk
Follow