Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsEmail verificata su uccs.edu
- Dr. Md. Abdur RazzaqueProfessor of Computer Science and Engineering, University of Dhaka, BangladeshEmail verificata su du.ac.bd
- M. Anwar HossainAssociate Professor, School of Computing, Queen's University, CanadaEmail verificata su queensu.ca
- Prof. Dr. Mohammad Mehedi HassanProfessor, Dept. of Information Systems, King Saud University, Riyadh, KSAEmail verificata su ksu.edu.sa
- Sujan SarkerAssistant Professor, Department of Robotics and Mechatronics Engineering, University of DhakaEmail verificata su du.ac.bd
- Mohamed ShehabProfessor, University of North Carolina at CharlotteEmail verificata su uncc.edu
- Nazmus Sakib MiaziAssistant Teaching Professor, Northeastern UniversityEmail verificata su northeastern.edu
- Jinpeng WeiAssociate Professor, University of North Carolina at CharlotteEmail verificata su uncc.edu
- Ehab Al-ShaerCarnegie Mellon UniversityEmail verificata su cmu.edu
- Amirreza NiakanlahijiSenior Security Researcher, Microsoft CorporationEmail verificata su microsoft.com
- Xi (Sunshine) NiuAssociate Professor, University of North Carolina at CharlotteEmail verificata su uncc.edu
- Asad Ali KhanUniversity of Texas at San AntonioEmail verificata su my.utsa.edu
- Anthony RiosAssistant Professor in Information Systems and Cyber SecurityEmail verificata su utsa.edu
- Sebastian A. NugrohoTechnical Specialist - R&T, Cummins Technical Center, Cummins Inc.Email verificata su cummins.com