Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Byron J. WilliamsUniversity of FloridaEmail verificata su cise.ufl.edu
- Alan DombkowskiWayne State UniversityEmail verificata su wayne.edu
- Douglas CraigEmergency Medicine Research, University of MichiganEmail verificata su med.umich.edu
- Zadia CodabuxUniversity of SaskatchewanEmail verificata su ieee.org
- Hasan JamilProfessor of Computer Science, University of IdahoEmail verificata su uidaho.edu
- Zalia ShamsMicrosoftEmail verificata su microsoft.com
- Rajshakhar PaulPhD Candidate, Department of Computer Science, Wayne State UniversityEmail verificata su wayne.edu
- Dr. Deb KaushikProfessor, Dept. of CSE, Chittagong University of Engineering & Technology (CUET)Email verificata su cuet.ac.bd
- TANMAY BHOWMIKMississippi State UniversityEmail verificata su msstate.edu
- Shahina FerdousSoftware Engineer, MicrosoftEmail verificata su microsoft.com
- Iqbal H Sarker, PhDCUET | Swinburne University | Cyber Security CRC | ECU, AustraliaEmail verificata su ecu.edu.au
- Md. Saidur RahmanProfessor, Dept. of Computer Science and Engineering, BUET, Dhaka-1000Email verificata su cse.buet.ac.bd