Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Mohamed Amine Ferrag, PhD, SIEEETeam Leader, Technology Innovation InstituteVerified email at ieee.org
- Tihanyi NorbertEötvös Loránd UniversityVerified email at inf.elte.hu
- Lucas C. CordeiroReader, Dept of Computer Science, University of ManchesterVerified email at manchester.ac.uk
- Tamas BisztrayPhD Research Fellow at University of OsloVerified email at ifi.uio.no
- Rahul PurandareAssociate Professor, University of Nebraska–LincolnVerified email at unl.edu
- Youcheng SunLecturer, University of ManchesterVerified email at manchester.ac.uk
- Yiannis CharalambousCasual Research Assistant, University of ManchesterVerified email at student.manchester.ac.uk
- Mthandazo NdhlovuSenior Security Researcher, Technology Innovation InstituteVerified email at tii.ae
- Nicole GervasoniSecurity Researcher, TIIVerified email at tii.ae
- Vasileios MavroeidisAssociate Professor of Cybersecurity, University of OsloVerified email at ifi.uio.no
- Sanjay RawatUniversity of BristolVerified email at bristol.ac.uk
- Venkatesh VinayakaraoLecturer, Chennai Mathematical Institute (CMI)Verified email at iiitd.ac.in
- Merouane DebbahKU 6G Center, Khalifa University, CentralesupelecVerified email at centralesupelec.fr
- Srikanth G TamilselvamIBM Research LabsVerified email at in.ibm.com
- Subodh SharmaIIT DelhiVerified email at cse.iitd.ac.in
- Amith SingheeDirector, IBM Research, India and Singapore. CTO IBM India and South AsiaVerified email at in.ibm.com
- Vini KanvarIBM Research, IIT Bombay
- Shivali AgarwalIBM ResearchVerified email at in.ibm.com