Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Choong Seon Hong, FIEEESchool of Computing, Kyung Hee UniversityVerified email at khu.ac.kr
- Sarder Fakhrul AbedinAssistant Professor (tenure track), Department of Computer and Electrical Engineering (DET), MidVerified email at miun.se
- Nguyen H. TranThe University of SydneyVerified email at sydney.edu.au
- Apurba AdhikaryAssistant Professor, Dept. of ICE, Noakhali Science and Technology University, BangladeshVerified email at nstu.edu.bd
- Anupam Kumar Bairagi, PhDProfessor of Computer Science and Engineering, Khulna University, BangladeshVerified email at cse.ku.ac.bd
- Zhu HanUniversity of HoustonVerified email at uh.edu
- Md. Golam Rabiul Alam, Ph.D.Professor, Department of Computer Science and Engineering, BRAC UniversityVerified email at bracu.ac.bd
- Kitae KimKyung Hee UniversityVerified email at khu.ac.kr
- Walid SaadProfessor, Electrical and Computer Engineering, Virginia TechVerified email at vt.edu
- Seong-Bae ParkKyung Hee UniversityVerified email at khu.ac.kr
- Yan Kyaw TunAalborg UniversityVerified email at es.aau.dk
- Sachin ShettyOld Dominion UniversityVerified email at odu.edu
- EUI-NAM HUHKyung Hee UniversityVerified email at khu.ac.kr
- Kyi TharMid Sweden UniversityVerified email at miun.se
- Dusit (Tao) NiyatoNanyang Technological University (NTU)Verified email at ntu.edu.sg
- Tariqul IslamAssistant Professor of Trustworthy Cyberspace, School of Information Studies, Syracuse UniversityVerified email at syr.edu
- Kamrul Hasan, Ph.D.Assistant Professor of Cybersecurity, Tennessee State University, Nashville, TNVerified email at tnstate.edu
- Danda B. RawatProfessor of ECE & CS, Howard UniversityVerified email at howard.edu
- S M Masud KarimUniversity of South AustraliaVerified email at unisa.edu.au