Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Brandon DixonAssociate Professor, University of AlabamaVerified email at cs.ua.edu
- Stuart ZwebenProfessor Emeritus, The Ohio State UniversityVerified email at osu.edu
- Dr. Matthew HudnallInformation Systems, Statistics, and Management Science, University of AlabamaVerified email at ua.edu
- Alison ClearAssociate Professor, Computing, Eastern Institute of Technology, NZVerified email at eit.ac.nz
- Siddharth KazaTowson UniversityVerified email at towson.edu
- Herbert MattordProfessor of Cybersecurity and Information Security and Assurance, Kennesaw State UniversityVerified email at kennesaw.edu
- Nenad JukicLoyola University ChicagoVerified email at luc.edu
- Huanjing WangWestern Kentucky UniversityVerified email at wku.edu
- Nicholas A. KraftFathomVerified email at fathom.video
- Muhammad Rizwan AsgharUniversity of Surrey, University of AucklandVerified email at surrey.ac.uk
- Eliana StavrouOpen University of CyprusVerified email at ouc.ac.cy
- Audun JøsangProfessor of Information Security, University of OsloVerified email at mn.uio.no
- Henrique SantosProfessor of Information Systems, University of MinhoVerified email at dsi.uminho.pt
- Lynn futcherNelson Mandela UniversityVerified email at mandela.ac.za
- Matt BishopUniversity of California at DavisVerified email at ucdavis.edu
- Andrew GraettingerAssociate Dean for ResearchVerified email at uwm.edu
- Michael J OudshoornHigh Point UniversityVerified email at highpoint.edu
- Edward SobieskProfessor, EECS, United States Military AcademyVerified email at westpoint.edu
- Boris JukicProfessor, Information Systems, Clarkson UniveristyVerified email at clarkson.edu
- Yair Levy, Ph.D.Professor of Information Systems and Cybersecurity, Nova Southeastern UniversityVerified email at nova.edu
Follow
Allen Parrish
Executive Director, Alabama Cyber Institute, The University of Alabama
Verified email at ua.edu