Get my own profile
Public access
View all23 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Adeel AnjumInstitute of Information Technology, Quaid-i-Azam University IslamabadVerified email at qau.edu.pk
- Mansoor Ahmed (PhD)Research Fellow @ ADAPT Centre & IVI- MU, Ireland; Former Marie-Curie (MSCA) FellowVerified email at mu.ie
- Dr. Munam Ali ShahDepartment of Computer Networks & Communication, King Faisal University (KFU), Al-Ahsa, Suadi ArabiaVerified email at kfu.edu.sa
- Gwanggil JeonShandong University of TechnologyVerified email at sdut.edu.cn
- Saif U. R. MalikCybernetica AS EstoniaVerified email at cyber.ee
- Farhana Jabeen (Tenured Associate P...COMSATS University, IslamabadVerified email at comsats.edu.pk
- Nadeem Javaid, IEEE/ACM Senior Me...Tenured Professor, COMSATS University Islamabad (CUI), Islamabad CampusVerified email at comsats.edu.pk
- Sabah SuhailQueen's University BelfastVerified email at qub.ac.uk
- Masoom AlamComsats Institute of information Technology islamabadVerified email at comsats.edu.pk
- Awais AhmadImam Mohammad Ibn Saud Islamic University, Riyadh, Kingdom of Saudi ArabiaVerified email at imamu.edu.sa
- Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Verified email at ksu.edu.sa
- Khizar Hameed, PhDUniversity of TasmaniaVerified email at utas.edu.au
- Choong Seon Hong, FIEEESchool of Computing, Kyung Hee UniversityVerified email at khu.ac.kr
- Faisal Bashir HussainBahria University IslamabadVerified email at bahria.edu.pk
Follow
Abid Khan (PhD)
College of Science and Engineering, University of Derby
Verified email at derby.ac.uk - Homepage