Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Bestoun S. AhmedDepartment of Mathematics and Computer Science, Karlstad UniversityVerified email at kau.se
Xavier BellekensUniversity of StrathclydeVerified email at strath.ac.uk
Hanan HindyPhD Student, Division of Cyber Security, Abertay University, Dundee, Scotland, UKVerified email at cis.asu.edu.eg
Christos TachtatzisUniversity of StrathclydeVerified email at strath.ac.uk
Robert Caddell AtkinsonUniversity of StrathclydeVerified email at strath.ac.uk
Wasif AfzalProfessor, Mälardalen University, Västerĺs, SwedenVerified email at mdh.se
David BROSSETFrench naval academy research instituteVerified email at ecole-navale.fr
Angelo GargantiniUniversity of BergamoVerified email at unibg.it
D. Richard (Rick) KuhnComputer scientist, National Institute of Standards and Technology (NIST)Verified email at nist.gov
Jiman HongSoongsil University
Miroslav Bures
Verified email at fel.cvut.cz - Homepage