Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Antonis MichalasAssociate Professor in Cyber Security, Tampere University, Tampere, FinlandEmail verificata su tuni.fi
- Nadeem Javaid, IEEE/ACM Senior Me...Tenured Professor, COMSATS University Islamabad (CUI), Islamabad CampusEmail verificata su comsats.edu.pk
- Adnan Akhunzada, PhD (Senior Mem...Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% ScientistEmail verificata su dtu.dk
- Irfan AzamPhD IT Convergence Engineering, Kumoh National Institute of Technology, KoreaEmail verificata su ieee.org
- Naina EmmanuelMS scholar of Information Security, CIIT IslamabadEmail verificata su student.comsats.edu.pk
- Masoom AlamComsats Institute of information Technology islamabadEmail verificata su comsats.edu.pk
- Alexandros BakasApplied Cryptographer at Nokia Bell LabsEmail verificata su nokia-bell-labs.com
- Waqas AmanPostDoc at Hamad Bin Khalifa UniversityEmail verificata su hbku.edu.qa
- Mohamed NassarUniversity of Alabama in HuntsvilleEmail verificata su uah.edu
- Ali HurPhD ResearcherEmail verificata su our.ecu.edu.au
- Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaEmail verificata su unimelb.edu.au
- Abid Khan (PhD)College of Science and Engineering, University of DerbyEmail verificata su derby.ac.uk
- Amir MuradLecturer at FATA UniversityEmail verificata su student.upm.edu.my
- Dr. Munam Ali ShahDepartment of Computer Networks & Communication, King Faisal University (KFU), Al-Ahsa, Suadi ArabiaEmail verificata su kfu.edu.sa
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Israr AhmadSunway University MalaysiaEmail verificata su imail.sunway.edu.my