Get my own profile
Public access
View all2 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Yue Cao, CEng|FIET|FRSA|FBCS|FHE...Professor at Wuhan UniversityVerified email at whu.edu.cn
- Naveed AhmadAssociate Professor, College of Computer and Information Science, Prince Sultan University, RiyadhVerified email at psu.edu.sa
- Zahid Ullah, PhDResearch Fellow, University of Leeds, UKVerified email at leeds.ac.uk
- Professor Nauman AslamNorthumbria University at Newcastle, UKVerified email at northumbria.ac.uk
- Mohsin RazaAssociate Professor, University of East Anglia, UKVerified email at uea.ac.uk
- Fahim NiazPh.D. Wuhan UniversityVerified email at whu.edu.cn
- Kezhi WangProfessor, Brunel University LondonVerified email at brunel.ac.uk
- Husnain RafiqLecturer in Cyber Security, Edge Hill University, Ormskirk, UKVerified email at edgehill.ac.uk
- Simon ParsonsUniversity of Lincoln, School of Computer ScienceVerified email at lincoln.ac.uk
- Leonardo GuevaraSenior Lecturer at Lincoln Institute for Agri-food Technology, University of LincolnVerified email at lincoln.ac.uk
- Rizwan Hamid RandhawaCNIguardVerified email at cniguard.com
- Adil Mehmood KhanProfessor, University of Hull, AIDecisions, Innopolis UniversityVerified email at hull.ac.uk