Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Md. Arafatur RahmanReader in Cyber Security, School of Mathematics and Computer Science, University of WolverhamptonVerified email at wlv.ac.uk
- Md Zakirul Alam BhuiyanComp. & Info. Sciences, Fordham University (Highly-Cited Researcher, The Rising Star of Science)Verified email at fordham.edu
- Ibnu Febry KurniawanUniversitas Negeri SurabayaVerified email at unesa.ac.id
- Raouf AbozaribaSenior Lecturer, Birmingham City UniversityVerified email at ieee.org
- Weisi GuoProfessor of Human Machine Intelligence - Cranfield University; Visiting Fellow - Alan Turing Inst.Verified email at cranfield.ac.uk
- Albert Guillen i FabregasUniversity of Cambridge, Universitat Pompeu FabraVerified email at ieee.org
- Paul D YooDy Director, Data Analytics Institute, Birkbeck College, University of London, United KingdomVerified email at ieee.org
- Yussuf AhmedBirmimgham City UniversityVerified email at bcu.ac.uk
- Yoon-Chan JhiDirector of Software Security in Technology Research at Samsung SDS, Seoul, KoreaVerified email at samsung.com
- Yonghong PengProfessor of Artificial Intelligence, Anglia Ruskin UniversityVerified email at aru.ac.uk
- Tobias KochUniversidad Carlos III de MadridVerified email at ieee.org
- Werner HaselmayrAssociate Professor, Johannes Kepler University LinzVerified email at jku.at
- Stephan ten BrinkInstitute of Telecommunications, University of StuttgartVerified email at inue.uni-stuttgart.de
- Fei HeAssociate Professor, Coventry UniversityVerified email at coventry.ac.uk