Get my own profile
Public access
View all4 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Rahim KhanAssociate Professor, AWKUMVerified email at awkum.edu.pk
Dr. Izaz Ur RahmanAssistant Professor, Sohar University Oman, Sultanate of OmanVerified email at su.edu.om
Lee GillamIndependent ResearcherVerified email at surrey.ac.uk
Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
Dr. Mukhtaj KhanThe University of HaripurVerified email at uoh.edu.pk
Omer RanaCardiff University, UKVerified email at cardiff.ac.uk
Yanmin ZhuDepartment of Computer Science and Engineering, Shanghai Jiao Tong UniversityVerified email at sjtu.edu.cn
Hashim AliAssistant Professor of Computer Science, Abdul Wali Khan University Mardan, KPK, PakistanVerified email at awkum.edu.pk
Mian Ahmad JanAssistant Professor, College of Computing and Informatics, University of SharjahVerified email at sharjah.ac.ae
Khaled SalahKhalifa University of Science and TechnologyVerified email at ku.ac.ae
Atta ur Rehman KhanProfessor, Ajman University, UAE.Verified email at ajman.ac.ae
Dr. Zhiyuan TanAssociate Professor in Cyber Security, Edinburgh Napier University, UKVerified email at napier.ac.uk
Muhammad UsmanFederation University AustraliaVerified email at federation.edu.au