Author of the publication

Game Based Cyber Security Training: are Serious Games suitable for cyber security training?

, , and . Int. J. Serious Games, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Improving Electricity Network Efficiency and Customer Satisfaction in Generation Constrained Power System., , , and . CoDIT, page 2010-2015. IEEE, (2019)An Intelligent Routing Approach for Multimedia Traffic Transmission Over SDN., , , , , and . DeSE, page 118-124. IEEE, (2023)Performance Evaluation for End-to-End Slice Management in 5G/B5G Cellular Networks., , , and . SoftCOM, page 1-6. IEEE, (2022)Sensor Data Classification for the Indication of Lameness in Sheep., , , and . CollaborateCom, volume 252 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 309-320. Springer, (2017)Developing a Real-Time ITS Using VANETs: A Case Study for Northampton Town., , and . IntelliSys (1), volume 15 of Lecture Notes in Networks and Systems, page 640-651. Springer, (2016)Design and evaluation of browser-to-browser video conferencing in WebRTC., , and . GIIS, page 75-78. IEEE, (2017)Utilisation of multipath phenomenon to improve the performance of BCH and RS codes., , , and . CEEC, page 6-11. IEEE, (2016)Traffic Classification using Deep Learning Approach for End-to-End Slice Management in 5G/B5G., , , and . ICTC, page 357-362. IEEE, (2022)WebNSM: A Novel Scalable WebRTC Signalling Mechanism for Many-to-Many Video Conferencing., , and . CIC, page 27-33. IEEE Computer Society, (2017)Machine-to-machine communications energy efficiencies: the implications of different M2M communications specifications., , , and . Int. J. Wirel. Mob. Comput., 8 (1): 15-26 (2015)