Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ali Kashif Bashir, PhD, SMIEEE.Professor at Manchester Metropolitan University, UK; Clarivate Highly Cited ResearcherVerified email at ieee.org
- Mohammed A. AlqarniAssociate Professor, Software Engineering Dept., University of JeddahVerified email at uj.edu.sa
- Sayed Chhattan ShahAssociate Professor of Computer Science at Hankuk University of Foreign Studies, South KoreaVerified email at hufs.ac.kr
- Gunasekaran RajaProfessor, Anna University, IndiaVerified email at ieee.org
- Ki-Hyung KimAjou UniversityVerified email at ajou.ac.kr
- Ali Hammad AkbarAssistant Professor, Department of Computer Science and Engineering, UET Lahore (PHD EE, MS EE, BEE)Verified email at uet.edu.pk
- Shafique Ahmad ChaudhrySchool of Business, Clarkson UniversityVerified email at clarkson.edu
- Farrukh Aslam KhanProfessor, King Saud UniversityVerified email at ksu.edu.sa
- Jeongjoon LeeLS Industrial SystemsVerified email at lsis.biz
- Hussain DawoodVerified email at nsu.edu.pk
- Haider Abbas, IET FellowProfessor (Tenured) of Cybersecurity @ National University of Sciences and Technology, PakistanVerified email at mcs.edu.pk
- Gulraiz Iqbal ChoudharyUniversity of Eastern FinlandVerified email at cs.uef.fi
- Muhammad AhmadAssociate Professor, National University of Computer and Emerging SciencesVerified email at nu.edu.pk
- Fida ChandioAssociate Professor Computer Science, University of SindhVerified email at usindh.edu.pk
- Zeeshan Hameed, Ph.D., SMIEEE, SF...Academic and Research Staff, Higher Colleges of Technology (HCT)Verified email at hct.ac.ae
Follow
Dr. Chauhdary Sajjad Hussain
Associate Professor-University of Jeddah
Verified email at uj.edu.sa