Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sumbal MalikPostdoctoral Fellow, Khalifa UniversityVerified email at ku.ac.ae
Deepak PuthalIIM Bodh GayaVerified email at iimbg.ac.in
Mukesh PrasadUniversity of Technology SydneyVerified email at uts.edu.au
Chin-Teng LinUniversity of Technology SydneyVerified email at uts.edu.au
Abderrahmane LakasProfessor, Computer Engineering, UAE UniversityVerified email at uaeu.ac.ae
Manoranjan MohantyFaculty | Carnegie Mellon UniversityVerified email at cmu.edu
Dr. Gokulnath ThandavarayanResearcher, Universidad Miguel Hernandez de Elche (UMH), SpainVerified email at umh.es
Zouheir TrabelsiProfessor of Information Security, College of IT, UAE UniversityVerified email at uaeu.ac.ae
Mohammed BoulmalfProfessor of Computer Science, International University of RabatVerified email at uir.ac.ma
Tamer RabieProfessor, Computer Engineering, College of Computing & Informatics, University of SharjahVerified email at sharjah.ac.ae
Yaser HawasProf. Civil & Env. Eng.Verified email at guc.edu.eg
Mohamed Eltoweissy (M. Eltoweissy)Associate Dean of Research and Professor, School of Computer, Mathematical and Natural SciencesVerified email at morgan.edu
Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au
Murray WoodsideDistinguished Research Professor, Carleton UniversityVerified email at sce.carleton.ca
Iman SalehResearch Scientist, Intel CorporationVerified email at vt.edu
Farhan SiddiquiDickinson CollegeVerified email at dickinson.edu
Minakshi PrasadCOVS, LUVAS, HisarVerified email at luvas.edu.in
Shenggui ZhangDepartment of Applied Mathematics, Northwestern Polytechnical University, Xi'an, Shaanxi 710072Verified email at nwpu.edu.cn