Get my own profile
Public access
View all8 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Ghulam Abbas, PhD, FIScT, FBCS, SM...GIK Institute of Engineering Sciences and Technology, PakistanVerified email at giki.edu.pk
- Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Verified email at gre.ac.uk
- Thar BakerUniversity of BrightonVerified email at brighton.ac.uk
- Zaiwar AliAssistant Professor, GIK InstituteVerified email at giki.edu.pk
- Lei JiaoProfessor of Information and Communication Technology, University of AgderVerified email at uia.no
- Frank Y. LiUniversity of AgderVerified email at uia.no
- Muhammad Sajid HaroonKwangwoon UniversityVerified email at hanyang.ac.kr
- Ahmad Kamal HassanGhulam Ishaq Khan Institute of Engineering Sciences & TechnologyVerified email at giki.edu.pk
- Shahab Haider, Ph.D. (Computer Engi...City University of Science and Information Technology, Peshawar, PakistanVerified email at cusit.edu.pk
- Zahid HalimGIK Institute of Engineering Sciences and TechnologyVerified email at giki.edu.pk
- Engr. Dr. Alamgir Naushad, PhD, PE,...National University of Science & Technology, Baluchistan Campus (NBC)Verified email at nbc.nust.edu.pk
- Bakht ZamanSimula Research Laboratory, Oslo, NorwayVerified email at simula.no