Get my own profile
Public access
View all143 articles
20 articles
available
not available
Based on funding mandates
Co-authors
Haris PervaizAssociate Professor, University of Essex, UKVerified email at essex.ac.uk
Thierry TurlettiINRIAVerified email at inria.fr
Leila MusavianProfessor, University of EssexVerified email at essex.ac.uk
Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Dr Max EizaSenior Lecturer in Computer Security, Liverpool John Moores UniversityVerified email at ljmu.ac.uk
Chadi BarakatResearch Director, Inria, Université Côte d'Azur, FranceVerified email at inria.fr
Imad AadCenter for Digital Trust (C4DT), EPFLVerified email at aad.me
Tianji LiHamilton Institute, National University of Ireland MaynoothVerified email at nuim.ie
Alexey VinelKarlsruhe Institute of Technology, GermanyVerified email at kit.edu
Chen Hsiao-HwaNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Kui WuComputer Science Dept., University of VictoriaVerified email at uvic.ca
David MaloneProfessor, Hamilton Institute / Department of Mathematics and StatisticsVerified email at nuim.ie
Douglas LeithProfessor, School of Computer Science & Statistics, Trinity College DublinVerified email at tcd.ie
Elvino S. SousaProfessor of Electrical Engineering, University of TorontoVerified email at utoronto.ca
Weidong XiangUniversity of Michigan, DearbornVerified email at umich.edu
Abbas Jamalipour, Fellow IEEE, Fello...Professor of Ubiquitous Mobile Networking, The University of SydneyVerified email at ieee.org
Gareth TaylorProfessor of Power Systems, Brunel University LondonVerified email at brunel.ac.uk
Ioana PisicaBrunel University LondonVerified email at brunel.ac.uk
Wenwu ZhuProfessor, Computer Science, Tsinghua UniverisityVerified email at tsinghua.edu.cn
Qian ZhangTencent Professor of Engineering, Chair Prof. of Dept. of CSE, HKUST, HKVerified email at cse.ust.hk