Crea il mio profilo
Accesso pubblico
Visualizza tutto7 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Dr. Sunny BehalAssociate Professor, Shaheed Bhagat Singh State University-FerozepurEmail verificata su sbsstc.ac.in
- Xenofon KoutsoukosVanderbilt UniversityEmail verificata su vanderbilt.edu
- Xenia MountrouidouSenior Security Researcher, Cyber adAPTEmail verificata su cyberadapt.com
- Greg GagneProfessor of Computer Science, Westminster CollegeEmail verificata su westminstercollege.edu
- Nicoleta Liviana TudorPetroleum-Gas University of Ploiesti, RomaniaEmail verificata su upg-ploiesti.ro
- Chadi KariAssociate Professor of Computer Science, University of the PacificEmail verificata su pacific.edu
- Timothy T. YuenUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Irfan AhmedVirginia Commonwealth UniversityEmail verificata su vcu.edu
- Fathi AmsaadWright State UniversityEmail verificata su wright.edu
- Goncalo MartinsUniversity of Denver (USA)Email verificata su du.edu
- Richard CandellNational Institute of Standards and TechnologyEmail verificata su nist.gov
- David VosenThe College of St. ScholasticaEmail verificata su css.edu
- Mohammad Q. Azhar, PhDBMCC, The City University Of New YorkEmail verificata su bmcc.cuny.edu
- Nishchal KushQueensland University of TechnologyEmail verificata su kush.com.fj
- Akande AyodejiMasters of Information Technology, QUTEmail verificata su griffithuni.edu.au
- Fekadu YihunieCybersecurityEmail verificata su mail.sacredheart.edu
- Sahaj SaxenaThapar Institute of TechnologyEmail verificata su thapar.edu
- ABDUL RAZAQUEResearcherEmail verificata su my.bridgeport.edu
- Waseem AbbasUniversity of Texas at DallasEmail verificata su utdallas.edu
- Gautam SrivastavaBrandon UniversityEmail verificata su brandonu.ca