Get my own profile
Public access
View all140 articles
50 articles
available
not available
Based on funding mandates
Co-authors
Haris PervaizAssociate Professor, University of Essex, UKVerified email at essex.ac.uk
Thierry TurlettiINRIAVerified email at inria.fr
Leila MusavianProfessor, University of EssexVerified email at essex.ac.uk
Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Dr Max EizaSenior Lecturer in Computer Security, Liverpool John Moores UniversityVerified email at ljmu.ac.uk
Chadi BarakatResearch Director, Inria, Université Côte d'Azur, FranceVerified email at inria.fr
Tianji LiHamilton Institute, National University of Ireland MaynoothVerified email at nuim.ie
Imad AadCenter for Digital Trust (C4DT), EPFLVerified email at aad.me
Alexey VinelKarlsruhe Institute of Technology, GermanyVerified email at kit.edu
Chen Hsiao-HwaNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Kui WuProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
David MaloneProfessor, Hamilton Institute / Department of Mathematics and Statistics, Maynooth UniversityVerified email at nuim.ie
Douglas LeithProfessor, School of Computer Science & Statistics, Trinity College DublinVerified email at tcd.ie
Abbas Jamalipour, Fellow IEEE, Fello...Professor of Ubiquitous Mobile Networking, The University of SydneyVerified email at ieee.org
Gareth TaylorProfessor of Power Systems, Brunel University LondonVerified email at brunel.ac.uk
Elvino S. SousaProfessor of Electrical Engineering, University of TorontoVerified email at utoronto.ca
Weidong XiangUniversity of Michigan, DearbornVerified email at umich.edu
Wenwu ZhuProfessor, Computer Science, Tsinghua UniverisityVerified email at tsinghua.edu.cn
Qian ZhangTencent Professor of Engineering, Chair Prof. of Dept. of CSE, HKUST, HKVerified email at cse.ust.hk
Ioana PisicaBrunel University LondonVerified email at brunel.ac.uk