Get my own profile
Co-authors
- Mansaf AlamProfessor, Department of Computer Science, Jamia Millia Islamia,Central Univ, New Delhi,IndiaVerified email at jmi.ac.in
- Kashish Ara ShakilDepartment of Computer Science, Princess Nourah bint AbdulRahman University and Jamia Millia IslamiaVerified email at pnu.edu.sa
- Xiufeng LiuDepartment of Technology, Management and Economics, Technical University of DenmarkVerified email at dtu.dk
- Dr. Sonali VyasAssociate Professor, UPES University DehradunVerified email at ddn.upes.ac.in
- Shahbaz KhanUniversity of TabukVerified email at ut.edu.sa
- Ahmed AlGhamdiComputer Engineering, Faculty of Computer and Information Technology, Taif University, Saudi ArabiaVerified email at tu.edu.sa
- Dr. Sultan S AlshamraniAssociate Professor at Taif UniversityVerified email at tu.edu.sa
- Marzia Hoque TaniaUNSW, University of Oxford, Anglia Ruskin UniversityVerified email at unsw.edu.au
- Haider M. al-KhateebAssociate Professor in Cyber Security, Aston UniversityVerified email at aston.ac.uk
- Muhammad Kamran NaeemUniversity of WolverhamptonVerified email at ieee.org
- Nadia RefatPost-Doctoral Research Fellow, University of BirminghamVerified email at bham.ac.uk
- Md. Arafatur RahmanReader in Cyber Security, School of Mathematics and Computer Science, University of WolverhamptonVerified email at wlv.ac.uk
- Usman Javed ButtNorthumbria UniversityVerified email at northumbria.ac.uk
- Dr Gabriela Ahmadi-AssalemiUniversity of CambridgeVerified email at cam.ac.uk
- Vladlena BensonProfessor, Cybersecurity ManagementVerified email at aston.ac.uk
- Ergun GideA/Professor of Intelligent Information Systems, CQUniversityVerified email at cqu.edu.au
- Mahmoud ElkhodrCentral Queensland UniversityVerified email at cqu.edu.au
- Prashant PillaiProfessor, University of WolverhamptonVerified email at wlv.ac.uk