Crea il mio profilo
Accesso pubblico
Visualizza tutto73 articoli
9 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mainak ChatterjeeApple Inc.Email verificata su apple.com
- Shahriar BadshaSr. Security Engineer, Bosch USAEmail verificata su us.bosch.com
- R. ChandramouliStevens Institute of TechnologyEmail verificata su ieee.org
- Raj Mani ShuklaAnglia Ruskin University, CambridgeEmail verificata su aru.ac.uk
- Iman VakiliniaAssistant Professor, University of North FloridaEmail verificata su unf.edu
- Deepak K. ToshAssistant ProfessorEmail verificata su utep.edu
- Suman BhuniaAssistant Professor, Miami University - OhioEmail verificata su miamioh.edu
- Paulo Alexandre RegisAssistant Professor, Southeastern Louisiana UniversityEmail verificata su southeastern.edu
- S. AnandNew York Institute of TechnologyEmail verificata su nyit.edu
- Samrat GangulyApple IncEmail verificata su apple.com
- Charles KamhouaDEVCOM Army Research Laboratory, Network Security BranchEmail verificata su army.mil
- Amar Nath PatraPhD Student, Department of Computer Science and Engineering, University of Nevada RenoEmail verificata su nevada.unr.edu
- Swastik BrahmaAssociate Professor, Department of Computer Science, University of CincinnatiEmail verificata su ucmail.uc.edu
- Felisa Vázquez-AbadProfessor of Computer ScienceEmail verificata su hunter.cuny.edu
- Kenneth EzirimResearcher, CUNY Graduate CenterEmail verificata su gradcenter.cuny.edu
- raja neogiDell EMCEmail verificata su emc.com
- Rauf IzmailovPeraton LabsEmail verificata su mail.peratonlabs.com
- Shameek BhattacharjeeAssistant Professor, Western Michigan UniversityEmail verificata su wmich.edu