Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Gunasekaran RajaProfessor, Anna University, IndiaVerified email at ieee.org
- Ali Kashif Bashir, PhD, SMIEEE.Professor at Manchester Metropolitan University, UK; Clarivate Highly Cited ResearcherVerified email at ieee.org
- Shakila BasheerPrincess Nourah Bint Abdulrahman UniversityVerified email at pnu.edu.sa
- Nawab Muhammad Faseeh Qureshi,...Sungkyunkwan UniversityVerified email at skku.edu
- Dr. Chauhdary Sajjad HussainAssociate Professor-University of JeddahVerified email at uj.edu.sa
- Mohammed Saeed AlkatheiriUniversity of JeddahVerified email at uj.edu.sa
- Alaa Omran AlmagrabiKing Abdulaziz UniversityVerified email at kau.edu.sa
- Raja KothandaramanProfessor&HoD- CSE SRM Institute of Science & Technology, RamapuramVerified email at srmist.edu.in
- Kottilingam KottursamyAnna University, Tamilnadu, IndiaVerified email at ieee.org
- Junaid CHAUDHRY PhD (Cyber Secu...College of Security and Intelligence, Embry-Riddle Aeronautical University, Prescott, ArizonaVerified email at ieee.org
- Amjad AliPostdoctoral Researcher at Hamad Bin Khalifa University, Doha, QatarVerified email at hbku.edu.qa
- Dipak GhosalProfessor of Computer Science, University of California, DavisVerified email at ucdavis.edu
- Ramkumar JayaramanAssistant professor, Computer Science and Engineering, SRM Institute of Science and TechnologyVerified email at srmist.edu.in
- Muhammad ShakilResearcher & CEO Genesis Merkle Group and Genesis IT LabVerified email at rnssol.com