Get my own profile
Public access
View all11 articles
1 article
available
not available
Based on funding mandates
Co-authors
G FairhurstVerified email at erg.abdn.ac.uk
Vladimir StankovicProfessor at University of StrathclydeVerified email at strath.ac.uk
Scott NeweySenior Scientist at The Game Wildlife Conservation Trust (Scotland)Verified email at hutton.ac.uk
Rene van der WalSwedish University of Agricultural SciencesVerified email at slu.se
Dejan VukobratovicICONIC Centre, Faculty of Technical Sciences, University of Novi SadVerified email at uns.ac.rs
R. J. IrvineJames Hutton InstituteVerified email at hutton.ac.uk
Lee StottMicrosoft, University College LondonVerified email at microsoft.com
Derek FosterUniversity of LincolnVerified email at lincoln.ac.uk
Majd SakrProfessor of Computer Science, Carnegie Mellon UniversityVerified email at cs.cmu.edu
Omar A. AlzubiProfessor, Al-Balqa Applied UniversityVerified email at bau.edu.jo
Hassan HamdounSolution Architect- Mobile, IT and Cloud- Cybersecurity Consultant and ArchitectVerified email at ieee.org