Get my own profile
Public access
View all29 articles
27 articles
available
not available
Based on funding mandates
Co-authors
Jerry Chun-Wei LinProfessor, IET Fellow, ACM Distinguished Member, Western Norway University of Applied SciencesVerified email at ieee.org
Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, Atlanta, USAVerified email at kennesaw.edu
Ali DehghantanhaAssociate Professor & Canada Research Chair in Cyber Security & Threat Intelligence at theVerified email at uoguelph.ca
Youcef DjenouriResearch Scientist, SINTEF, Oslo, NorwayVerified email at sintef.no
Praveen Kumar Reddy MaddikuntaAssistant Professor (Senior), School of Information Technology, VIT, VelloreVerified email at vit.ac.in
Ashutosh Dhar DwivediCopenhagen Business SchoolVerified email at cbs.dk
Hadis KarimipourAssociate Professor-University of CalgaryVerified email at ucalgary.ca
Abbas YazdinejadUniversity of GuelphVerified email at uoguelph.ca
Rajani SinghCopenhagen Business SchoolVerified email at cbs.dk
Vijay MagoLakehead UniversityVerified email at lakeheadu.ca
Jorge CrichignoUniversity of South CarolinaVerified email at cec.sc.edu
Bruce KapronProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
Lukas MalinaBrno University of TechnologyVerified email at feec.vutbr.cz
Dr. Chandra Segar Thirumalai, Ph.DProfessor, VITVerified email at vit.ac.in
Sean ChesterUniversity of VictoriaVerified email at uvic.ca
Petr DzurendaBrno University of TechnologyVerified email at vut.cz
Eman S. A. AbuJaradPh.D. of MathematicsVerified email at vub.be
Alex ThomoProfessor of Computer Science, University of VictoriaVerified email at cs.uvic.ca
Toshiyuki AMAGASAUniversity of TsukubaVerified email at cs.tsukuba.ac.jp