Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Verified email at gre.ac.uk
- Ghulam Abbas, PhD, FIScT, FBCS, SM...GIK Institute of Engineering Sciences and Technology, PakistanVerified email at giki.edu.pk
- Shanshan TuBeijing University of TechnologyVerified email at bjut.edu.cn
- Abdul Rauf BaigProfessor, Computer Science, Imam Mohammad Ibn Saud Islamic University, RiyadhVerified email at imamu.edu.sa
- Dr. Sadaqat RehmanUniversity of SalfordVerified email at salford.ac.uk
- Syed Fawad HussainUniversity of BirminghamVerified email at bham.ac.uk
- Dr. Atta Ur RahmanRiphah Institute of System Engineering (RISE), Riphah International University, Islamabad, PakistanVerified email at riphah.edu.pk
- uzma(Phd)Verified email at giki.edu.pk
- Doğan AydınIzmir Katip Çelebi UniversityVerified email at ikc.edu.tr
- Zhu HanUniversity of HoustonVerified email at uh.edu
- Sheng ChenProfessor, University of SouthamptonVerified email at ecs.soton.ac.uk
- Muhammad Ghufran KhanPhD CandidateVerified email at inria.fr
- Muhammad AtifUniversity of FlorenceVerified email at unifi.it
- Mustapha LebbahParis-Saclay University - UVSQVerified email at uvsq.fr
- Saadi BoudjitAssociate professor, university of Paris 13Verified email at univ-paris13.fr
- Omer AliPhD Student, Norwegian Radium HospitalVerified email at uio.no
- Shahid IqbalPhD Student of IT, Monash UniversityVerified email at monash.edu
- Saima HassanAssistant Professor at the Institute of Computing Kohat University of ScienceVerified email at kust.edu.pk
- Zhongliang Yang (杨忠良)Associate Professor, Beijing University of Posts and TelecommunicationsVerified email at tsinghua.org.cn
- Anis KoubâaPrince Sultan University | Executive Director of the Innovation Center | Director of ResearchVerified email at psu.edu.sa