Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Maryline LaurentTelecom SudParisVerified email at telecom-sudparis.eu
Sana BelguithSenior Lecturer in Cyber Security, University of Bristol UKVerified email at bristol.ac.uk
Giovanni RusselloProfessor and Head of School of Computer Science, University of AucklandVerified email at auckland.ac.nz
Abderrazak JEMAIInstitut National des Sciences Appliquées et de TechnologieVerified email at insat.rnu.tn
Ola SalmanDeepVuVerified email at deepvu.co
Ali ChehabProfessor & Chair of ECE Department, American University of BeirutVerified email at aub.edu.lb
Hassan N. NouraUniversity of Franche-ComtéVerified email at univ-fcomte.fr
Aymen BoudguigaCEAVerified email at cea.fr
Mohammad Hammoudeh, Aramco Cy...King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Dr. Eng. Mohamad MalliCEO of boxMind.aiVerified email at boxMind.ai
Joaquin Garcia-AlfaroSAMOVAR, Telecom SudParis, Institut Polytechnique de ParisVerified email at ieee.org
Mohamed MohamedAppleVerified email at wethink.info
Tooska DargahiSenior Lecturer (Associate Professor) in Cyber Security, Manchester Metropolitan University, UKVerified email at mmu.ac.uk
Christophe KiennertTélécom SudParisVerified email at telecom-sudparis.eu
Ashish GehaniSRIVerified email at sri.com
Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
Nazatul Haque SultanResearch ScientistVerified email at data61.csiro.au
Ferdous Ahmed BarbhuiyaProfessor, Indian Institute of Information Technology GuwahatiVerified email at iiitg.ac.in
Abba GarbaPhD, Peking UniversityVerified email at pku.edu.cn
Nicolas SklavosComputer Engineering and Informatics Department (CEID), University of Patras, GreeceVerified email at upatras.gr