Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Choong Seon Hong, FIEEESchool of Computing, Kyung Hee UniversityVerified email at khu.ac.kr
Sarder Fakhrul AbedinSenior Lecturer, Department of Computer and Electrical Engineering (DET), Mid Sweden UniversityVerified email at miun.se
Apurba AdhikaryAssistant Professor, Dept. of ICE, Noakhali Science and Technology University, BangladeshVerified email at nstu.edu.bd
Nguyen H. TranThe University of SydneyVerified email at sydney.edu.au
Anupam Kumar Bairagi, PhDProfessor of Computer Science and Engineering, Khulna University, BangladeshVerified email at cse.ku.ac.bd
Zhu HanUniversity of HoustonVerified email at uh.edu
Md. Golam Rabiul Alam, Ph.D.Professor, Department of Computer Science and Engineering, BRAC UniversityVerified email at bracu.ac.bd
Kitae KimKyung Hee UniversityVerified email at khu.ac.kr
Walid SaadProfessor, Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
Yan Kyaw TunAalborg UniversityVerified email at es.aau.dk
Sachin ShettyOld Dominion UniversityVerified email at odu.edu
Seong-Bae ParkKyung Hee UniversityVerified email at khu.ac.kr
EUI-NAM HUHKyung Hee UniversityVerified email at khu.ac.kr
Kyi TharMid Sweden UniversityVerified email at miun.se
Dusit (Tao) NiyatoNanyang Technological University (NTU)Verified email at ntu.edu.sg
Tariqul IslamAssistant Professor of Trustworthy Cyberspace, School of Information Studies, Syracuse UniversityVerified email at syr.edu
Kamrul HasanAssistant Professor of Cybersecurity, Tennessee State University, Nashville, TNVerified email at tnstate.edu
Danda B. RawatProfessor of ECE & CS, Howard UniversityVerified email at howard.edu
S M Masud KarimUniversity of South AustraliaVerified email at unisa.edu.au