Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Antonis MichalasAssociate Professor in Cyber Security, Tampere University, Tampere, FinlandVerified email at tuni.fi
- Nadeem Javaid, IEEE/ACM Senior Me...Tenured Professor, COMSATS University Islamabad (CUI), Islamabad CampusVerified email at comsats.edu.pk
- Adnan Akhunzada, PhD (Senior Mem...Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% ScientistVerified email at dtu.dk
- Irfan AzamPhD IT Convergence Engineering, Kumoh National Institute of Technology, KoreaVerified email at ieee.org
- Naina EmmanuelMS scholar of Information Security, CIIT IslamabadVerified email at student.comsats.edu.pk
- Masoom AlamComsats Institute of information Technology islamabadVerified email at comsats.edu.pk
- Alexandros BakasApplied Cryptographer at Nokia Bell LabsVerified email at nokia-bell-labs.com
- Waqas AmanPostDoc at Hamad Bin Khalifa UniversityVerified email at hbku.edu.qa
- Mohamed NassarUniversity of Alabama in HuntsvilleVerified email at uah.edu
- Ali HurPhD ResearcherVerified email at our.ecu.edu.au
- Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
- Abid Khan (PhD)College of Science and Engineering, University of DerbyVerified email at derby.ac.uk
- Amir MuradLecturer at FATA UniversityVerified email at student.upm.edu.my
- Dr. Munam Ali ShahDepartment of Computer Networks & Communication, King Faisal University (KFU), Al-Ahsa, Suadi ArabiaVerified email at kfu.edu.sa
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Israr AhmadSunway University MalaysiaVerified email at imail.sunway.edu.my