Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
- K. JaishankarPrincipal Director & Professor, International Institute of Justice and Police SciencesVerified email at icssinstitute.org
- Jonathan LusthausDirector of the Human Cybercriminal Project, University of OxfordVerified email at sociology.ox.ac.uk
- Miranda BrucePostgraduate Fellow, University of OxfordVerified email at sociology.ox.ac.uk
- Stephen McCombieNHL Stenden University of Applied ScienceVerified email at nhlstenden.com
- Josef PieprzykCSIRO Data61Verified email at csiro.au
- Alana MaurushatProfessor of Cybersecurity and BehaviourVerified email at westernsydney.edu.au
- Dr Alaeldin Mansour MaghairehAjman UniversityVerified email at ajman.ac.ae
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
- Yi MuProfessorVerified email at cityu.mo
- C.-C. Jay KuoMing Hsieh Chair Professor in ECE-Systems, University of Southern CaliforniaVerified email at sipi.usc.edu
- Wanlei ZhouProfessor, City University of Macau, MacaoVerified email at cityu.edu.mo
- Fergus HansonNon Resident Fellow, Brookings InstitutionVerified email at brookings.edu
- David TuffleySenior Lecturer, School of ICT, Griffith University, Australia.Verified email at griffith.edu.au
- Javier LópezProfesor Tecnología de la Información y las Comunicaciones, Universidad de A CoruñaVerified email at udc.es
- Dr Matt Bruceclinical psychologistVerified email at kcl.ac.uk