Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Sumbal MalikPostdoctoral Fellow, Khalifa UniversityVerified email at ku.ac.ae
- Deepak PuthalKhalifa UniversityVerified email at ku.ac.ae
- Mukesh PrasadUniversity of Technology SydneyVerified email at uts.edu.au
- Chin-Teng LinUniversity of Technology SydneyVerified email at uts.edu.au
- Abderrahmane LakasProfessor, Computer Engineering, UAE UniversityVerified email at uaeu.ac.ae
- Manoranjan MohantyFaculty | Carnegie Mellon UniversityVerified email at cmu.edu
- Gokulnath ThandavarayanResearcher, Universidad Miguel Hernandez de Elche (UMH), SpainVerified email at umh.es
- Zouheir TrabelsiProfessor of Information Security, College of IT, UAE UniversityVerified email at uaeu.ac.ae
- Mohammed BoulmalfProfessor of Computer Science, International University of RabatVerified email at uir.ac.ma
- Tamer RabieProfessor, Computer Engineering, College of Computing & Informatics, University of SharjahVerified email at sharjah.ac.ae
- Yaser HawasProf. Civil & Env. Eng.Verified email at guc.edu.eg
- Mohamed Eltoweissy (M. Eltoweissy)Associate Dean of Research and Professor, School of Computer, Mathematical and Natural SciencesVerified email at morgan.edu
- Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au
- Murray WoodsideDistinguished Research Professor, Carleton UniversityVerified email at sce.carleton.ca
- Iman SalehResearch Scientist, Intel CorporationVerified email at vt.edu
- Farhan SiddiquiDickinson CollegeVerified email at dickinson.edu
- Minakshi PrasadCOVS, LUVAS, HisarVerified email at luvas.edu.in
- Shenggui ZhangDepartment of Applied Mathematics, Northwestern Polytechnical University, Xi'an, Shaanxi 710072Verified email at nwpu.edu.cn