Get my own profile
Public access
View all2 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Yue Cao, FRSA|FBCS|FHEA|SMIEEEProfessor at Wuhan UniversityVerified email at whu.edu.cn
- Naveed AhmadAssociate Professor, College of Computer and Information Science, Prince Sultan University, RiyadhVerified email at psu.edu.sa
- Zahid Ullah, PhDResearch Fellow, University of Leeds, UKVerified email at leeds.ac.uk
- Professor Nauman AslamNorthumbria University at Newcastle, UKVerified email at northumbria.ac.uk
- Mohsin RazaSenior Lecturer, Edge Hill University, Ormskirk, UKVerified email at edgehill.ac.uk
- Kezhi WangProfessor, Brunel University LondonVerified email at brunel.ac.uk
- Husnain RafiqLecturer in Cyber Security, Edge Hill University, Ormskirk, UKVerified email at edgehill.ac.uk
- Simon ParsonsUniversity of Lincoln, School of Computer ScienceVerified email at lincoln.ac.uk
- César Leonardo GuevaraAssistant Professor at Lincoln Institute for Agri-food Technology, University of LincolnVerified email at lincoln.ac.uk
- Rizwan Hamid RandhawaCNIguardVerified email at cniguard.com