Get my own profile
Public access
View all13 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Moatsum AlawidaAbu Dhabi University.Verified email at adu.ac.ae
- Azman SamsudinUniversiti Sains MalaysiaVerified email at cs.usm.my
- Norziana JamilUnited Arab Emirates University and Universiti Tenaga NasionalVerified email at uaeu.ac.ae
- Jiageng ChenCentral China Normal UniversityVerified email at ccnu.edu.cn
- Wei-Zhu YeohCISPA Helmholtz Center for Information Security, PhD StudentVerified email at cispa.de
- Damilare Peter OYINLOYEFellow, Norwegian University of Science and TechnologyVerified email at ntnu.no
- Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
- Alex BiryukovFull Professor of Computer Science, University of LuxembourgVerified email at uni.lu
- Aleksei UdovenkoSnT, University of LuxembourgVerified email at uni.lu
- Yang XiangIEEE Fellow, Professfor, Swinburne University of TechnologyVerified email at swin.edu.au
- Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
- Weizhi MengProfessor, Lancaster University, United KingdomVerified email at lancaster.ac.uk
- Vesselin VelichkovLecturer in Security and Privacy, The University of EdinburghVerified email at ed.ac.uk
- Jiashen TehAssociate Professor, University Sains Malaysia (USM)Verified email at usm.my