Get my own profile
Public access
View all13 articles
14 articles
available
not available
Based on funding mandates
Co-authors
- Georgios MantasUniversity of GreenwichVerified email at ieee.org
- Ayman RadwanUniversidade de AveiroVerified email at av.it.pt
- Shahid Mumtaz, ProfessorNottingham Trent UniversityVerified email at ieee.org
- Alireza EsfahaniLecturer in Cyber Security at University of West LondonVerified email at uwl.ac.uk
- Alberto NascimentoUniversity of MadeiraVerified email at uma.pt
- Kazi Mohammed Saidul HuqSenior Technical StaffVerified email at ieee.org
- Victor SucasasTechnology Innovation Institute (Abu Dhabi) - Cryptography Research CentreVerified email at tii.ae
- Raed Abd-AlhameedProfessor of Radio Frequency Engineering, University of BradfordVerified email at bradford.ac.uk
- Christoph SchmittnerScientist, AIT Austrian Instituit of TechnologyVerified email at ait.ac.at
- Ani BicakuLulea University of Technology, EISLABVerified email at ltu.se
- Silia MaksutiResearcher, University of Applied Sciences Burgenland, Lulea University of Technology, EISLABVerified email at fh-burgenland.at
- Fatemeh Bashashi SaghezchiUniversidade de AveiroVerified email at ua.pt
- M. AlamLondon South Bank University, London, UK.Verified email at lsbu.ac.uk
- Felipe Gil-CastiñeiraatlanTTic Research center for Telecommunication Technologies. Universidade de Vigo.Verified email at gti.uvigo.es
- Tasos DagiuklasLondon South Bank University, Head of Research Centre for Cognitive SystemsVerified email at lsbu.ac.uk
- Mohammed Al-RawiUniversity of Aveiro, PortugalVerified email at ua.pt
- Abd-Elhamid M. TahaAlfaisal UniversityVerified email at alfaisal.edu
- Michele AlbanoAssociate Professor at Aalborg UniversityVerified email at cs.aau.dk
- Hugo MarquesInstituto Politécnico de Castelo BrancoVerified email at ipcb.pt
- Anwer Al-DulaimiZayed UniversityVerified email at ieee.org