Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Elisa BertinoProfessor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Anna C SquicciariniPennsylvania State UniversityEmail verificata su psu.edu
- Gail-Joon AhnArizona State UniversityEmail verificata su asu.edu
- Yousra JavedAssistant Professor of Cybersecurity, Illinois State UniversityEmail verificata su ilstu.edu
- Said M. MaroufPh.D, iOS and Mac DeveloperEmail verificata su uncc.edu
- Fadi MohsenUniversity of GroningenEmail verificata su rug.nl
- Abeer AlJarrahTrellixEmail verificata su ieee.org
- Salmin SultanaResearch Scientist, Intel LabsEmail verificata su intel.com
- Heather Richter LipfordProfessor, University of North Carolina at CharlotteEmail verificata su uncc.edu
- Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteEmail verificata su uncc.edu
- Federica PaciDepartment of Computer Science, University of VeronaEmail verificata su univr.it
- Gabriel GhinitaHamad Bin Khalifa UniversityEmail verificata su umb.edu
- Nazmus Sakib MiaziAssistant Teaching Professor, Northeastern UniversityEmail verificata su northeastern.edu
- Mohammad Ashiqur RahmanFlorida International UniversityEmail verificata su fiu.edu
- Smitha SundareswaranMeta, Microsoft, Google, Penn State UniversityEmail verificata su fb.com
- Ravi SandhuUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Mohammad Hossein ManshaeiIUT/EPFL/INRIAEmail verificata su epfl.ch
- Andrew BesmerWinthrop UniversityEmail verificata su winthrop.edu
- Jinpeng WeiAssociate Professor, University of North Carolina at CharlotteEmail verificata su uncc.edu
- Bojan CukicProfessor and Dean, College of Computing and Informatics, University of North Carolina at CharlotteEmail verificata su uncc.edu
Segui
Mohamed Shehab
Professor, University of North Carolina at Charlotte
Email verificata su uncc.edu - Home page