Get my own profile
Public access
View all0 articles
1 article
available
not available
Based on funding mandates
Co-authors
Muhammad AsimNational University of Computer and Emerging SciencesVerified email at nu.edu.pk
Thar BakerUniversity of BrightonVerified email at brighton.ac.uk
Farrukh Aslam KhanProfessor of Cyber Security, King Saud UniversityVerified email at ksu.edu.sa
Muhammad Zubair FarooqiAALTO University, FinlandVerified email at aalto.fi
Feras Al-Obeidat, PhDZayed UniversityVerified email at ca.ibm.com
Ibrahim GhafirUniversity of BradfordVerified email at bradford.ac.uk
Mohammad Hammoudeh, Saudi Aram...King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
"Abdelouahid Derhab"Associate Professor of Computer Science, King Saud UniversityVerified email at ksu.edu.sa
Sohail AbbasAssociate Professor, University of SharjahVerified email at sharjah.ac.ae
Syed Atif MoqurrabAssistant Professor at School of Computing, Gachon UniversityVerified email at gachon.ac.kr
Adeel AnjumInstitute of Information Technology, Quaid-i-Azam University IslamabadVerified email at qau.edu.pk
Nora FaciUniversité Lyon 1, FranceVerified email at univ-lyon1.fr
Zakaria MaamarUniversity of Doha for Science and Technology, Doha, State of QatarVerified email at udst.edu.qa
Umer FarooqNational University of Computer and Emerging SciencesVerified email at nu.edu.pk
Gautam SrivastavaBrandon UniversityVerified email at brandonu.ca
Alia AsheralievaSouthern University of Science and Technology, ChinaVerified email at sustech.edu.cn
Sukhpal Singh GillQueen Mary University of London, UKVerified email at qmul.ac.uk
Saif U. R. MalikCybernetica AS EstoniaVerified email at cyber.ee
Hassan MalikEdge Hill UniversityVerified email at edgehill.ac.uk
Haris PervaizAssociate Professor, University of Essex, UKVerified email at essex.ac.uk