Get my own profile
Public access
View all13 articles
1 article
available
not available
Based on funding mandates
Co-authors
Sule Yildirim Yayilgan (orchid id: 0000...Professor of Information SecurityVerified email at ntnu.no
Sher Muhammad DaudpotaProfessor of Computer Science, Sukkur IBA UniversityVerified email at iba-suk.edu.pk
Ali Shariq ImranNorwegian University of Science and Technology (NTNU)Verified email at ntnu.no
Sindhu AbroNTNU, Gjovik, NorwayVerified email at iba-suk.edu.pk
Ehtesham HashmiNorwegian University of Science and Technology (NTNU)Verified email at ntnu.no
Zenun KastratiAssociate Professor, Linnaeus UniversityVerified email at lnu.se
Marcel PikhartUniversity of Hradec KraloveVerified email at uhk.cz
Blanka KlimovaProfessor, Univerzita Hradec KrálovéVerified email at uhk.czMohamed AbomharaCybersecurity Researcher | GRC Analyst | Data Ethics and Privacy ExpertVerified email at ntnu.no
Rabbia MahumLecturer, UET TaxilaVerified email at uettaxila.edu.pkMiloslava CernaUniversity of Hradec Kralove, Faculty of Informatics and ManagementVerified email at uhk.cz
Rakhi BatraDepartment of Computer Science & Engineering Ohio State UniversityVerified email at osu.edu
Rizwan Ali AbroSukkur Institute of Business AdministrationVerified email at iba-suk.edu.pk
Ghulam Mujtaba ShaikhProfessor, Department of Computer Science, Sukkur Institute of Business Administration UniversityVerified email at iba-suk.edu.pk
Nimra MughalResearcher, Sukkur IBA UniversityVerified email at iba-suk.edu.pk
Ahmed M. El-SherbeenyAssistant Professor of Industrial Engineering, King Saud UniversityVerified email at ksu.edu.sa
Faisal Shafique ButtCOMSATS University Islamabad, Wah CampusVerified email at ciitwah.edu.pkRashid Amin (PhD)University of Engineering and Technology, Taxila, PakistanVerified email at uettaxila.edu.pk
Hafiz Abid Mahmood Malik, PhDFlorida International UniversityVerified email at fiu.edu
Tahira NazirRiphah International University IslamabadVerified email at riphah.edu.pk