Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sumbal MalikUnited Arab Emirates UniversityEmail verificata su uaeu.ac.ae
- Deepak PuthalKhalifa UniversityEmail verificata su ku.ac.ae
- Mukesh PrasadUniversity of Technology SydneyEmail verificata su uts.edu.au
- Chin-Teng LinUniversity of Technology SydneyEmail verificata su uts.edu.au
- Abderrahmane LakasProfessor, Computer Engineering, UAE UniversityEmail verificata su uaeu.ac.ae
- Manoranjan MohantySenior Lecturer (Associate Professor), University of Technology SydneyEmail verificata su uts.edu.au
- Gokulnath ThandavarayanResearcher, Universidad Miguel Hernandez de Elche (UMH), SpainEmail verificata su umh.es
- Zouheir TrabelsiProfessor of Information Security, College of IT, UAE UniversityEmail verificata su uaeu.ac.ae
- Mohammed BoulmalfProfessor of Computer Science, International University of RabatEmail verificata su uir.ac.ma
- Tamer RabieProfessor, Computer Engineering, College of Computing & Informatics, University of SharjahEmail verificata su sharjah.ac.ae
- Yaser HawasProf. Civil & Env. Eng.Email verificata su guc.edu.eg
- Mohamed Eltoweissy (M. Eltoweissy)Associate Dean of Research and Professor, School of Computer, Mathematical and Natural SciencesEmail verificata su morgan.edu
- Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneEmail verificata su latrobe.edu.au
- Murray WoodsideDistinguished Research Professor, Carleton UniversityEmail verificata su sce.carleton.ca
- Iman SalehResearch Scientist, Intel CorporationEmail verificata su vt.edu
- Farhan SiddiquiDickinson CollegeEmail verificata su dickinson.edu
- Minakshi PrasadCOVS, LUVAS, HisarEmail verificata su luvas.edu.in
- Shenggui ZhangDepartment of Applied Mathematics, Northwestern Polytechnical University, Xi'an, Shaanxi 710072Email verificata su nwpu.edu.cn