Crea il mio profilo
Accesso pubblico
Visualizza tutto14 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Mohammad ZulkernineProfessor, School of Computing, Queen's UniversityEmail verificata su cs.queensu.ca
Sheikh Iqbal AhamedMarquette University, USAEmail verificata su marquette.edu
Maria ValeroAssistant Professor, Kennesaw State UniversityEmail verificata su kennesaw.edu
Chi ZhangKennesaw State UniversityEmail verificata su kennesaw.edu
Mohammad MasumPostdoctoral ResearcherEmail verificata su students.kennesaw.edu
Mohammad Ashiqur RahmanFlorida International UniversityEmail verificata su fiu.edu
Sweta SnehaProfessor of Information SystemsEmail verificata su kennesaw.edu
Md Jobair Hossain FarukKennesaw State UniversityEmail verificata su students.kennesaw.edu
Md Arabin Islam TalukderGraduate Research Assistant, Kennesaw State UniversityEmail verificata su students.kennesaw.edu
Alfredo CuzzocreaProfessor of Computer Engineering, University of Calabria, ItalyEmail verificata su si.dimes.unical.it
Michael E. WhitmanProfessor of Information Security and Assurance, Kennesaw State UniversityEmail verificata su kennesaw.edu
Kommy Weldemariam, Master Inventor...IBM ResearchEmail verificata su cs.queensu.ca
Akond RahmanTennessee Tech UniversityEmail verificata su tntech.edu
Thibaud LutellierUniversity of AlbertaEmail verificata su ualberta.ca
Md Abdullah Al Hafiz KhanAssistant Professor, Department of Compute Science, Kennesaw State UniversityEmail verificata su kennesaw.edu
Mahbubul IslamKennesaw State UniversityEmail verificata su grad.kennesaw.edu
Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, Atlanta, USAEmail verificata su kennesaw.edu
Farhat Lamia BarshaGraduate Research Assistant, Tennessee Technological UniversityEmail verificata su tntech.edu
Hongmei ChiFlorida A&M UniversityEmail verificata su famu.edu
Amarjit DattaTennessee Technological UniversityEmail verificata su students.tntech.edu