Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Brandon DixonAssociate Professor, University of AlabamaVerified email at cs.ua.eduStuart ZwebenProfessor Emeritus, The Ohio State UniversityVerified email at osu.edu
Alison ClearAssociate Professor, Computing, Eastern Institute of Technology, NZVerified email at eit.ac.nz
Dr. Matthew HudnallInformation Systems, Statistics, and Management Science, University of AlabamaVerified email at ua.edu
Siddharth KazaTowson UniversityVerified email at towson.eduLynn futcherNelson Mandela UniversityVerified email at mandela.ac.za
Nenad JukicLoyola University ChicagoVerified email at luc.edu
Herbert MattordProfessor of Cybersecurity, Kennesaw State UniversityVerified email at kennesaw.edu
Muhammad Rizwan AsgharUniversity of Surrey, University of AucklandVerified email at surrey.ac.uk
Eliana StavrouOpen University of CyprusVerified email at ouc.ac.cyAudun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
Henrique SantosAssociate Professor, University of MinhoVerified email at dsi.uminho.pt
Nicholas A. KraftFathomVerified email at fathom.video
Huanjing WangWestern Kentucky UniversityVerified email at wku.edu
Matt BishopUniversity of California at DavisVerified email at ucdavis.eduMichael J OudshoornHigh Point UniversityVerified email at highpoint.edu
Andrew GraettingerAssociate Dean for ResearchVerified email at uwm.edu
Svetlozar NestorovAssociate Professor of Information Systems, Loyola University ChicagoVerified email at luc.edu
Yair Levy, Ph.D.Professor of Information Systems and Cybersecurity, Nova Southeastern UniversityVerified email at nova.edu
Edward SobieskProfessor, EECS, United States Military AcademyVerified email at westpoint.edu
Follow
Allen Parrish
Vice President for Research and Economic Development, University of South Alabama
Verified email at southalabama.edu