Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
Anang Hudaya Muhamad AminAssistant Professor, Higher Colleges of Technology - Dubai Men'sVerified email at hct.ac.ae
Raja Azlina Raja MahmoodFaculty of Computer Science and Information Technology, Universiti Putra MalaysiaVerified email at upm.edu.my
Dr. Benny Benyamin Nasution, Dipl.In...Senior Lecturer of Information Technology, Politeknik Negeri MedanVerified email at polmed.ac.id
Zubair BaigAssociate Professor, Cyber-Security, Deakin University, Melbourne, AustraliaVerified email at deakin.edu.au
Evgeny OsipovProfessor, Luleå University of TechnologyVerified email at ltu.se
Mohamed BaqerAssistant Professor, University of BahrainVerified email at uob.edu.bh
Ardeshir Bahreininejad, ProfessorUniversiti Teknologi BruneiVerified email at utb.edu.bn
Denis KleykoÖrebro University & RISE Research institutes of SwedenVerified email at oru.se
Ahmet SekerciogluSorbonne Universités, UTC CNRS Heudiasyc LaboratoryVerified email at ieee.org
Dr. Jan Carlo BarcaAustralian Public ServantVerified email at defence.gov.au
Jens EliassonEISLAB, Luleå University of TechnologyVerified email at ltu.se
Julian F V VincentHonorary Professor, Heriot-Watt UniversityVerified email at hw.ac.uk
Fredrik SandinProfessor in Machine Learning, Luleå University of Technology, EISLAB, SwedenVerified email at ltu.se
Elisabetta ChiccaZernike Institute for Advanced Materials and CogniGron Center, University of GroningenVerified email at rug.nl
Heinrich (Heinz) Wilhelm SchmidtComputer Science, RMIT University & Innovation Software AdvisoryVerified email at rmit.edu.au