Get my own profile
Public access
View all18 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Professor Yuefeng LiQueensland university of technologyVerified email at qut.edu.au
- Richi NayakProfessor, Queensland University of TechnologyVerified email at qut.edu.au
- Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
- Xujuan ZhouUniversity of Southern QueenslandVerified email at usq.edu.au
- Huizhi LiangNewcastle UniversityVerified email at newcastle.ac.uk
- Ahmad Abdel-HafezUniversity of Doha for Science and TechnologyVerified email at udst.edu.qa
- Li-Tung WengPhD, Queensland University of TechnologyVerified email at intellihr.co
- Touhid BhuiyanProfessor of Cyber Security, Washington University of Science and TechnologyVerified email at wust.edu
- Peter BruzaProfessor of Information Systems, Queensland University of TechnologyVerified email at qut.edu.au
- Abdullah AlgarniAssociate Professor, Institute of Public Administration, Saudi Arabia -previously with QUT AustraliaVerified email at ipa.edu.sa