Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Issa TraoreProfessor, ECE Department, University of VictoriaEmail verificata su ece.uvic.ca
- Wei LuProfessor of Computer Science, Keene State College/USNHEmail verificata su keene.edu
- Marcelo Luiz BrocardoProfessorEmail verificata su uvic.ca
- arunita jaekelWindsorEmail verificata su uwindsor.ca
- Dan GarantMassMutualEmail verificata su massmutual.com
- Luis RuedaProfessor, School of Computer Science, University of WindsorEmail verificata su uwindsor.ca
- Mohammad MamunResearch Officer, National Research Council CanadaEmail verificata su nrc-cnrc.gc.ca
- Youssef NAKKABIEmail verificata su plurilock.com
- Asem GhalebSecurity ResearcherEmail verificata su ece.ubc.ca
- Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowEmail verificata su ieee.org
- Mohiuddin AhmedSenior Lecturer of Computing & Security at Edith Cowan University, IEEE Senior MemberEmail verificata su ecu.edu.au
- Brijesh JethvaUniversity of VictoriaEmail verificata su uvic.ca
- Sanjay Kumar Dhurandher, Senior Me...Professor, Netaji Subhas University of Technology, New Delhi, IndiaEmail verificata su nsut.ac.in
- Shady MohammedDep. of Software Engineering, Faculty of Computer Science and Information Technology, Ahram CanadianEmail verificata su acu.edu.eg
- Isaac WoungangToronto Metropolitan University (TMU)