Crea il mio profilo
Accesso pubblico
Visualizza tutto15 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaEmail verificata su umn.edu
- Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaEmail verificata su kaist.ac.kr
- Shelia Kennison, ProfessorDepartment of Psychology, Oklahoma State UniversityEmail verificata su okstate.edu
- Yanmin GongUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Mohammed AbuhamadLoyola University ChicagoEmail verificata su luc.edu
- Denis Foo KuneAmazon Web ServicesEmail verificata su amazon.com
- Peng WangQualcommEmail verificata su qti.qualcomm.com
- Eugene VassermanKansas State UniversityEmail verificata su ksu.edu
- Tamer ABUHMEDAssociate Professor, College of Computing and Informatics, Sungkyunkwan UniversityEmail verificata su skku.edu
- Praveen khethavathLaGuardia Community CollegeEmail verificata su lagcc.cuny.edu
- Yuanxiong GuoUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Victor HeorhiadiAWSEmail verificata su victorh.net
- Loretta StalansLoyola University ChicagoEmail verificata su luc.edu
- Jinoh KimAssociate Professor, Texas A&M University-CommerceEmail verificata su tamuc.edu
Segui
Eric Chan-Tin
Associate Professor of Cybersecurity, Loyola University Chicago
Email verificata su cs.luc.edu - Home page