Crea il mio profilo
Accesso pubblico
Visualizza tutto18 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Professor Yuefeng LiQueensland university of technologyEmail verificata su qut.edu.au
- Richi NayakProfessor, Queensland University of TechnologyEmail verificata su qut.edu.au
- Audun JøsangProfessor of Information Security, University of OsloEmail verificata su mn.uio.no
- Xujuan ZhouUniversity of Southern QueenslandEmail verificata su usq.edu.au
- Huizhi LiangNewcastle UniversityEmail verificata su newcastle.ac.uk
- Ahmad Abdel-HafezUniversity of Doha for Science and TechnologyEmail verificata su udst.edu.qa
- Li-Tung WengPhD, Queensland University of TechnologyEmail verificata su intellihr.co
- Touhid BhuiyanProfessor of Cyber Security, Washington University of Science and TechnologyEmail verificata su wust.edu
- Peter BruzaProfessor of Information Systems, Queensland University of TechnologyEmail verificata su qut.edu.au
- Abdullah AlgarniAssociate Professor, Institute of Public Administration, Saudi Arabia -previously with QUT AustraliaEmail verificata su ipa.edu.sa