Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Mohamed ShehabProfessor, University of North Carolina at CharlotteEmail verificata su uncc.edu
- Muhammad Murtaza KhanNational University of Sciences and TechnologyEmail verificata su seecs.edu.pk
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentEmail verificata su kent.ac.uk
- James NicholsonAssociate Professor, Northumbria UniversityEmail verificata su northumbria.ac.uk
- Matt DixonNorthumbria UniversityEmail verificata su northumbria.ac.uk
- Opeyemi Dele-Ajayi Ph.DResearch@MetaEmail verificata su meta.com
- Toni PerkovićUniversity of Split, FESB unist.hrEmail verificata su fesb.hr
- Heather Richter LipfordProfessor, University of North Carolina at CharlotteEmail verificata su uncc.edu
- Hassan KhanUniversity of GuelphEmail verificata su uoguelph.ca
- Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteEmail verificata su uncc.edu
- Jocelyn ChanussotINRIA, on leave from Grenoble INPEmail verificata su grenoble-inp.fr
- Mary Lou MaherUNC CharlotteEmail verificata su uncc.edu
Segui
Yousra Javed
Assistant Professor of Cybersecurity, Illinois State University
Email verificata su ilstu.edu - Home page