Crea il mio profilo
Accesso pubblico
Visualizza tutto12 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ahmad Y. JavaidAssociate Professor, The University of ToledoEmail verificata su utoledo.edu
- Weiqing SunProfessor, University of ToledoEmail verificata su utoledo.edu
- Xiaoli YangFairfield UniversityEmail verificata su fairfield.edu
- Sidike PahedingAssistant Professor of Computer Science, Fairfield UniversityEmail verificata su fairfield.edu
- Farha JahanAssistant Professor, Ohio Northern UniversityEmail verificata su rockets.utoledo.edu
- Akshay MathurFairfield UniversityEmail verificata su fairfield.edu
- Abel Andres Reyes AnguloMichigan Technological UniversityEmail verificata su mtu.edu
- Yuchen LiResearch Assistant of Electrical and Computer Engineering, Purdue University NorthwestEmail verificata su pnw.edu
- Jeevan S DevagiriStudent at Michigan TechEmail verificata su mtu.edu
- Samantha L. SmithMichigan Technological UniversityEmail verificata su mtu.edu
- Safia RahmatCyber Security Data Analytics ExpertEmail verificata su utoledo.edu
- Keyur KulkarniUniversity of ToledoEmail verificata su utoledo.edu
- Ahmad Maroof KarimiOak Ridge National LaboratoryEmail verificata su case.edu
- Colin ElkinXylem Inc.Email verificata su xylem.com
- A. J. Sravan KumarStudent at Koneru Lakshmaiah Education FoundationEmail verificata su kluniversity.in
- Dr. P. C. Srinivasa RaoAssoc. Prof, K L Hyd, Former Researcher, Purdue University NW, USA, Ph.D. (IIT), PDF (IIIT)Email verificata su klh.edu.in
- Aaditeshwar SethComputer Science, IIT DelhiEmail verificata su cse.iitd.ernet.in
- Medha PujariUniversity of ToledoEmail verificata su rockets.utoledo.edu
- Asmer Hamid AliPhD Student, Johns Hopkins UniversityEmail verificata su jh.edu
- Rayed Suhail AhmadGraduate Research Assistant, Purdue University NorthwestEmail verificata su pnw.edu