Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Muhammad Khurram BhattiAssociate Professor at University of Exeter, UKVerified email at exeter.ac.uk
Vianney LapotreAssociate professor / Lab-STICCVerified email at univ-ubs.fr
Ayaz AkramUniversity of California, DavisVerified email at ucdavis.edu
Florent BruguierLIRMM, CNRS - University of MontpellierVerified email at lirmm.fr
NOVO DavidLIRMM,University of Montpellier, and CNRSVerified email at lirmm.fr
Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
Natasha AlkhatibCybersecurity researcher and engineer at ETAS BOSCHVerified email at telecom-paris.fr
Hadi GhauchAssistant Professor, Telecom ParisTechVerified email at telecom-paristech.fr
Maham ChaudhryStudentVerified email at itu.edu.pk
Umer FarooqUniversity of Sunderland, UKVerified email at sunderland.ac.uk
Muhammad Asim MukhtarInformation Technology UniversityVerified email at itu.edu.pk
Naveed Bin RaisProfessor, Ajman UniversityVerified email at ajman.ac.ae
Isil OzIzmir Institute of TechnologyVerified email at iyte.edu.tr
Mats BrorssonUniversity of LuxembourgVerified email at uni.lu
Lilian BossuetProfessor, University of Lyon, Saint-Etienne - Laboratoire Hubert Curien - CNRSVerified email at univ-st-etienne.fr
Clémentine MauriceCNRSVerified email at cnrs.fr
Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
Usman AliMeta Platforms IncVerified email at meta.com