Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Antonis MichalasAssociate Professor in Cyber Security, Tampere University, Tampere, FinlandVerified email at tuni.fi
Nadeem Javaid, IEEE/ACM Senior Me...ComSens Lab, International Graduate School of AI, National Yunlin University, TaiwanVerified email at yuntech.edu.tw
Adnan Akhunzada, PhD (Senior Mem...Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% ScientistVerified email at dtu.dk
Irfan AzamPhD IT Convergence Engineering, Kumoh National Institute of Technology, KoreaVerified email at ieee.org
Naina EmmanuelMS scholar of Information Security, CIIT IslamabadVerified email at student.comsats.edu.pk
Masoom AlamComsats Institute of information Technology islamabadVerified email at comsats.edu.pk
Alexandros BakasApplied Cryptographer at Nokia Bell LabsVerified email at nokia-bell-labs.com
Waqas AmanPostdoctoral Fellow at Hamad Bin Khalifa UniversityVerified email at hbku.edu.qa
Israr AhmadSunway University MalaysiaVerified email at imail.sunway.edu.my
Mohamed NassarUniversity of New HavenVerified email at newhaven.edu
Ali HurEdith Cowan UniversityVerified email at ecu.edu.au
Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
Abid Khan (PhD)College of Science and Engineering, University of DerbyVerified email at derby.ac.uk
Amir MuradLecturer at FATA UniversityVerified email at student.upm.edu.my
Dr. Munam Ali ShahDepartment of Computer Networks & Communication, King Faisal University (KFU), Al-Ahsa, Suadi ArabiaVerified email at kfu.edu.sa
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu