Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Choong Seon Hong, FIEEESchool of Computing, Kyung Hee UniversityEmail verificata su khu.ac.kr
- Sarder Fakhrul AbedinAssistant Professor (tenure track), Department of Computer and Electrical Engineering (DET), MidEmail verificata su miun.se
- Nguyen H. TranThe University of SydneyEmail verificata su sydney.edu.au
- Apurba AdhikaryAssistant Professor, Dept. of ICE, Noakhali Science and Technology University, BangladeshEmail verificata su nstu.edu.bd
- Anupam Kumar Bairagi, PhDProfessor of Computer Science and Engineering, Khulna University, BangladeshEmail verificata su cse.ku.ac.bd
- Zhu HanUniversity of HoustonEmail verificata su uh.edu
- Md. Golam Rabiul Alam, Ph.D.Professor, Department of Computer Science and Engineering, BRAC UniversityEmail verificata su bracu.ac.bd
- Kitae KimKyung Hee UniversityEmail verificata su khu.ac.kr
- Walid SaadProfessor, Electrical and Computer Engineering, Virginia TechEmail verificata su vt.edu
- Seong-Bae ParkKyung Hee UniversityEmail verificata su khu.ac.kr
- Yan Kyaw TunAalborg UniversityEmail verificata su es.aau.dk
- Sachin ShettyOld Dominion UniversityEmail verificata su odu.edu
- EUI-NAM HUHKyung Hee UniversityEmail verificata su khu.ac.kr
- Kyi TharMid Sweden UniversityEmail verificata su miun.se
- Dusit (Tao) NiyatoNanyang Technological University (NTU)Email verificata su ntu.edu.sg
- Tariqul IslamAssistant Professor of Trustworthy Cyberspace, School of Information Studies, Syracuse UniversityEmail verificata su syr.edu
- Kamrul Hasan, Ph.D.Assistant Professor of Cybersecurity, Tennessee State University, Nashville, TNEmail verificata su tnstate.edu
- Danda B. RawatProfessor of ECE & CS, Howard UniversityEmail verificata su howard.edu
- S M Masud KarimUniversity of South AustraliaEmail verificata su unisa.edu.au