Get my own profile
Public access
View all11 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Amr YoussefConcordia UniversityVerified email at ciise.concordia.ca
Guang GongProfessor, Dept. ECE, University of WaterlooVerified email at uwaterloo.ca
Raghvendra RohitAssistant Professor, Department of Computer Science and Engineering, IIT RoorkeeVerified email at cs.iitr.ac.in
Kalikinkar MandalAssistant Professor at University of New Brunswick, FrederictonVerified email at uwaterloo.ca
Mouna NakkarConcordia UniversityVerified email at ciise.concordia.ca
Gangqiang YangUniversity of WaterlooVerified email at uwaterloo.ca
M SeifelnasrConcordia UniversityVerified email at encs.concordia.ca
Aaron GulliverDepartment of Electrical and Computer Engineering, University of VictoriaVerified email at ece.uvic.ca
Ahmed AbdelkhalekConcordia University, Montreal, CanadaVerified email at encs.concordia.ca
Muhammad ElSheikhPhD student, Concordia University, CanadaVerified email at nis.sci.eg
Nusa ZidaricLeiden UniversityVerified email at liacs.leidenuniv.nl
Onur DumanGlasgow Caledonian University, LecturerVerified email at gcu.ac.uk
Shamim ShihabUniversity of VictoriaVerified email at uvic.ca
Hisham S. GalalAssiut UniversityVerified email at aun.edu.eg
Essam GhadafiSenior Lecturer, Newcastle UniversityVerified email at ncl.ac.uk
Martijn HendriksEindhoven University of TechnologyVerified email at tue.nl
Mridul NandiIndian Statistical InstituteVerified email at isical.ac.in
Ashwin JhaCISPA Helmholtz Center for Information SecurityVerified email at cispa.de
Follow
Riham AlTawy
Associate Professor, Dept. ECE, University of Victoria
Verified email at uvic.ca - Homepage