Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Tarek Rahil SheltamiProfessor of Electircal and Computer Engineering, KFUPMVerified email at kfupm.edu.sa
- Quazi MamunCharles Sturt UniversityVerified email at csu.edu.au
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Rafiqul IslamA/Professor in Computing, Charles Sturt UniversityVerified email at csu.edu.au
- Mohammad ShorfuzzamanProfessor, Department of Computer Science, CCIT, Taif University, Saudi ArabiaVerified email at tu.edu.sa
- Khandakar Fazley RabbiPhD Scholar, Charles Sturt UniversityVerified email at csu.edu.au
- Dr. Syed Mohammed Shamsul Islam (...Senior Lecturer in Computer Science, Edith Cowan University, Perth, Western AustraliaVerified email at ecu.edu.au
- Dr. Shafaat AhmedIBM Semiconductor Research and Development Center