Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Muhammad Khurram BhattiAssociate Professor at University of Exeter, UKVerified email at exeter.ac.uk
- Vianney LapotreAssociate professor / Lab-STICCVerified email at univ-ubs.fr
- Ayaz AkramUniversity of California, DavisVerified email at ucdavis.edu
- Florent BruguierLIRMM, CNRS - University of MontpellierVerified email at lirmm.fr
- NOVO DavidLIRMM,University of Montpellier, and CNRSVerified email at lirmm.fr
- Jean-Luc DangerLTCI, Télécom Paris, Institut Polytechnique de ParisVerified email at enst.fr
- Natasha AlkhatibCybersecurity researcher and engineer at ETAS BOSCHVerified email at telecom-paris.fr
- Hadi GhauchAssistant Professor, Telecom ParisTechVerified email at telecom-paristech.fr
- Maham ChaudhryStudentVerified email at itu.edu.pk
- Umer FarooqUniversity of Sunderland, UKVerified email at sunderland.ac.uk
- Muhammad Asim MukhtarInformation Technology UniversityVerified email at itu.edu.pk
- Naveed Bin RaisProfessor, Ajman UniversityVerified email at ajman.ac.ae
- Isil OzIzmir Institute of TechnologyVerified email at iyte.edu.tr
- Mats BrorssonUniversity of LuxembourgVerified email at uni.lu
- Lilian BossuetProfessor, University Jean Monnet, Saint-Etienne - Laboratoire Hubert Curien - CNRSVerified email at univ-st-etienne.fr
- Clémentine MauriceCNRSVerified email at cnrs.fr
- Sylvain GUILLEYTELECOM-ParisTechVerified email at secure-ic.com
- Usman AliMeta Platforms IncVerified email at meta.com