Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring the role of work identity and work locus of control in information security awareness., , , , and . Comput. Secur., (2019)Vulnerability Analysis, Intrusion Detection and Privacy Preservation of Modern Communication Systems., , and . EAI Endorsed Trans. Security Safety, 4 (12): e1 (2017)Defence Mechanisms for Public Systems., , and . EAI Endorsed Trans. Security Safety, 4 (13): e1 (2018)Introduction to the special issue of the journal of information security and applications on "ICS & SCADA cyber security"., , , and . J. Inf. Secur. Appl., (2017)Cyber warfare: Issues and challenges., , and . Comput. Secur., (2015)Introduction to the special issue of the journal of information security and applications on" cyber security in ICS & SCADA systems"., , , and . J. Inf. Secur. Appl., (2020)Developing cyber peacekeeping: Observation, monitoring and reporting., , , and . Gov. Inf. Q., 36 (2): 276-293 (2019)A Compositional Event & Time-Based Policy Model., , , , and . POLICY, page 173-182. IEEE Computer Society, (2006)A trust based approach to mobile multi-agent systems.. De Montfort University, Leicester, UK, (2010)British Library, EThOS.Developing Cyber Buffer Zones., , , and . CoRR, (2018)