Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Maryline LaurentTelecom SudParisVerified email at telecom-sudparis.eu
Sana BelguithLecturer in Cyber Security and Applied Cryptography, University of Bristol UKVerified email at bristol.ac.uk
Giovanni RusselloProfessor and Head of School of Computer Science, University of AucklandVerified email at auckland.ac.nz
Abderrazak JEMAIInstitut National des Sciences Appliquées et de TechnologieVerified email at insat.rnu.tn
Hassan N. NouraUniversity of Franche-ComtéVerified email at univ-fcomte.fr
Ali ChehabProfessor & Chair of ECE Department, American University of BeirutVerified email at aub.edu.lb
Ola SalmanDeepVuVerified email at deepvu.co
Mohammad Hammoudeh, Aramco Cy...King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
Aymen BoudguigaCEAVerified email at cea.fr
Dr. Eng. Mohamad MalliCEO of boxMind.aiVerified email at boxMind.ai
Joaquin Garcia-AlfaroSAMOVAR, Telecom SudParis, Institut Polytechnique de ParisVerified email at ieee.org
Mohamed MohamedAppleVerified email at wethink.info
Tooska DargahiSenior Lecturer in Cybersecurity, Manchester Metropolitan University, UKVerified email at mmu.ac.uk
Pierre-Olivier RocherIngénieur de recherche, Télécom SudParisVerified email at telecom-sudparis.eu
Christophe KiennertTélécom SudParisVerified email at telecom-sudparis.eu
Ashish GehaniSRIVerified email at sri.com
Heiko LudwigResearch Manager, IBM ResearchVerified email at us.ibm.com
Abba GarbaPhD, Peking UniversityVerified email at pku.edu.cn
Nicolas SklavosComputer Engineering and Informatics Department (CEID), University of Patras, GreeceVerified email at upatras.gr
Nazatul Haque SultanResearch ScientistVerified email at data61.csiro.au