Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaEmail verificata su uwf.edu
- Muhaiminul Islam AdnanLecturer in MathematicsEmail verificata su ins.uiu.ac.bd
- Sheikh Iqbal AhamedMarquette University, USAEmail verificata su marquette.edu
- Mingon KangUniversity of Nevada, Las VegasEmail verificata su unlv.edu
- Alfredo CuzzocreaDistinguished Professor of Computer Engineering, University of Calabria, ItalyEmail verificata su si.dimes.unical.it
- Sai Chandra KosarajuPhD candidate at university of nevada, Las vegas (UNLV)Email verificata su unlv.edu
- Tasmia AqilaGraduate Teaching Assistant,Florida International UniversityEmail verificata su fiu.edu
- Ananda MondalComputing and Information Sciences, Florida International UniversityEmail verificata su fiu.edu
- Md Shafiul AlamKennesaw State UniversityEmail verificata su students.kennesaw.edu
- Sweta SnehaProfessor of Information SystemsEmail verificata su kennesaw.edu
- WenZhan SongGeorgia Power Mickey A. Brown Professor, Computer Engineering, University of GeorgiaEmail verificata su uga.edu
- Mohammed Rahim Uddin ChowdhuryAssistant Professor of Decision Sciences, WIUEmail verificata su gwmail.gwu.edu