Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Saiful Azad, PhDProfessor, Department of Computer Science and Engineering, Green University of BangladeshVerified email at cse.green.edu.bd
- Md Zakirul Alam BhuiyanComp. & Info. Sciences, Fordham University (Highly-Cited Researcher, The Rising Star of Science)Verified email at fordham.edu
- Muhammad Nomani KabirUnited International University, BangladeshVerified email at cse.uiu.ac.bd
- Prof. Dr. Aisha Hassan Abdalla HashimInternational Islamic University MalaysiaVerified email at iium.edu.my
- MF Zolkipli, PhDAssociate Professor, School of Computing, Universiti Utara MalaysiaVerified email at uum.edu.my
- Jahan AliAuckland University of TechnologyVerified email at aut.ac.nz
- Mohammed AtiquzzamanHitachi Chair, Presidential Professor of Computer Science, University of OklahomaVerified email at ou.edu
- Marcello CaleffiProfessor, University of Naples Federico IIVerified email at unina.it
- Zamree Che-aronInternational Islamic University Malaysia, Prince of Songkla UniversityVerified email at psu.ac.th
- Angela Sara CacciapuotiAssociate Professor, University of Naples Federico IIVerified email at unina.it
- Prashant PillaiProfessor, University of WolverhamptonVerified email at wlv.ac.uk
- Mosharrof Hussain MasudInternational Islamic University MalaysiaVerified email at live.iium.edu.my
- Eklas Hossain, PhD PE SMIEEEAssociate Professor, Boise State UniversityVerified email at boisestate.edu
- Dr. M. AkhtaruzzamanAsst. Prof., CSE, MIST, BangladeshVerified email at cse.mist.ac.bd
- Mohd Ishak IsmailFaculty of Computer Systems & Software Engineering, University Malaysia PahangVerified email at iab.edu.my
Follow
Md. Arafatur Rahman
Reader in Cyber Security, School of Mathematics and Computer Science, University of Wolverhampton
Verified email at wlv.ac.uk - Homepage