Get my own profile
Co-authors
Deepak PuthalSchool of Computing, Newcastle University, United KingdomVerified email at ncl.ac.uk
Mukesh PrasadUniversity of Technology SydneyVerified email at uts.edu.au
Abderrahmane LakasProfessor, Network Engineering, UAE UniversityVerified email at uaeu.ac.ae
Chin-Teng LinUniversity of Technology SydneyVerified email at uts.edu.au
Mohammed BoulmalfProfessor of Computer Science, International University of RabatVerified email at uir.ac.ma
Manoranjan MohantyLecturer, University of Technology SydneyVerified email at uts.edu.au
Tamer RabieProfessor, Computer Engineering, College of Computing & Informatics, University of SharjahVerified email at sharjah.ac.ae
Gokulnath ThandavarayanResearcher, Miguel Hernandez University of Elche, SpainVerified email at umh.es
Shenggui ZhangDepartment of Applied Mathematics, Northwestern Polytechnical University, Xi'an, Shaanxi 710072Verified email at nwpu.edu.cn
Zouheir TrabelsiProfessor of Information Security, College of IT, UAE UniversityVerified email at uaeu.ac.ae
Mohamed Eltoweissy (M. Eltoweissy)Department Head and Professor of Computer and Information Sciences, Virginia Military InstituteVerified email at vmi.edu
Professor Naveen ChilamkurtiProfessor and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au
Murray WoodsideDistinguished Research Professor, Carleton UniversityVerified email at sce.carleton.ca
Iman SalehResearch Scientist, Intel CorporationVerified email at vt.edu
farhan siddiquidickinson collegeVerified email at dickinson.edu
Minakshi PrasadCOVS, LUVAS, HisarVerified email at luvas.edu.in
Yaser HawasProf. Civil & Env. Eng.