Get my own profile
Public access
View all2 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Sudip MisraFIEEE, FAAIA, FNAE, FNASc, FIET, ACM DM, Professor & INAE Abdul Kalam Tech Innovation NationalVerified email at cse.iitkgp.ac.in
- Jhareswar MaitiProfessor, Industrial & Systems Engineering, IIT KharagpurVerified email at iem.iitkgp.ac.in
- Arijit RoyIndian Institute of Technology PatnaVerified email at iitp.ac.in
- Anandarup MukherjeeInstitute for Manufacturing (IfM), University of Cambridge, U.K.Verified email at ieee.org
- Pallav Kumar DebSiemens Technology and Services Pvt. Ltd.Verified email at siemens.com
- Prajnamaya DassPostdoctoral Researcher, Barkhausen Institute, GermanyVerified email at barkhauseninstitut.org
- Dr. Saswati PalTechnische Universität BerlinVerified email at tu-berlin.de
- Yoga RahulamathavanReader in Cybersecurity and Privacy, Loughborough University, UKVerified email at lboro.ac.uk
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
- Dusit (Tao) NiyatoNanyang Technological University (NTU)Verified email at ntu.edu.sg
- Mohammad S. Obaidat, Life Fellow of I...University of Jordan, University of Science & Tech Beijing, SRM Univ & Amity UnivVerified email at ju.edu.jo
- Joel Rodrigues, AAIA & IEEE FELLOW...Senac Ceará; KSU; Lusofona University, COPELABS; UFPI; INATEL; UBI; Instituto de TelecomunicaçõesVerified email at ieee.org