Crea il mio profilo
Accesso pubblico
Visualizza tutto6 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ravi SandhuUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Yuan ChengGrand Valley State UniversityEmail verificata su gvsu.edu
- Dang NguyenAmazon Web ServicesEmail verificata su my.utsa.edu
- Xinwen ZhangHiretualEmail verificata su hiretual.com
- Maanak GuptaAssociate Professor, Tennessee Tech UniversityEmail verificata su tntech.edu
- Smriti BhattPurdue UniversityEmail verificata su purdue.edu
- Elisa BertinoProfessor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Gabriel GhinitaHamad Bin Khalifa UniversityEmail verificata su umb.edu
- Murat KantarciogluProfessor of Computer Science, Virginia TechEmail verificata su vt.edu
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasEmail verificata su utdallas.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsEmail verificata su uccs.edu
- Tahmina AhmedPhD, Department of Computer Science,University of Texas a San AntonioEmail verificata su my.utsa.edu
- Khalid BijonSnowflakeEmail verificata su snowflake.com
- Ram KrishnanUniversity of Texas at San AntonioEmail verificata su utsa.edu