Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Antonis MichalasAssociate Professor in Cyber Security, Tampere University, Tampere, FinlandVerified email at tuni.fi
Nadeem Javaid, IEEE/ACM Senior Me...Tenured Professor, COMSATS University Islamabad (CUI), Islamabad CampusVerified email at comsats.edu.pk
Adnan Akhunzada, PhD (Senior Mem...Associate Professor, DTU - Denmark Tech Uni | Ranked in World's Top 2% ScientistVerified email at dtu.dk
Irfan AzamPhD IT Convergence Engineering, Kumoh National Institute of Technology, KoreaVerified email at ieee.org
Naina EmmanuelMS scholar of Information Security, CIIT IslamabadVerified email at student.comsats.edu.pk
Masoom AlamComsats Institute of information Technology islamabadVerified email at comsats.edu.pk
Alexandros BakasApplied Cryptographer at Nokia Bell LabsVerified email at nokia-bell-labs.com
Waqas AmanPostDoc at Hamad Bin Khalifa UniversityVerified email at hbku.edu.qa
Mohamed NassarVerified email at uah.edu
Ali HurPhD ResearcherVerified email at our.ecu.edu.au
Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
Abid Khan (PhD)College of Science and Engineering, University of DerbyVerified email at derby.ac.uk
Amir MuradLecturer at FATA UniversityVerified email at student.upm.edu.my
Dr. Munam Ali ShahDepartment of Computer Networks & Communication, King Faisal University (KFU), Al-Ahsa, Suadi ArabiaVerified email at kfu.edu.sa
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Israr AhmadSunway University MalaysiaVerified email at imail.sunway.edu.my