Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Lei PanAssociate Professor, School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
- Robin DossDeakin Cyber Research & Innovation Centre (Deakin Cyber), Deakin UniversityVerified email at deakin.edu.au
- Sumit BadotraPost-Doc Research ScientistVerified email at nus.edu.sg
- Edeh Michael Onyema, Ph.DCoal City University, Nigeria / Professor at Shobhit University, IndiaVerified email at ccu.edu.ng
- Judith Nnedimkpa AjimaCoal City UniversityVerified email at ccu.edu.ng
- Carlos Andrés Tavera RomeroUniversidad Santiago de CaliVerified email at usc.edu.co
- Prof. (Dr.) Surjeet DalalAmity University Haryana, Gurugram, Haryana 122403Verified email at ggn.amity.edu
- Lauritta Chinazaekpere Ndufeiya-Ku...University of Port HarcourtVerified email at uniport.edu.ng
- Dr. Ahthasham SajidDepartment of Cyber Security, Riphah Institute of Systems Engineering, IslamabadVerified email at riphah.edu.pk
- Kulbhushan SharmaChitkara universityVerified email at chitkara.edu.in
- Amit VermaProfessor
- K R RamkumarChitkara UniversityVerified email at chitkara.edu.in