Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Dr Md Anisur RahmanLecturer in Business Analytics, La Trobe Business School, La Trobe UniversityEmail verificata su latrobe.edu.au
- Jongmyon Kim울산대 IT융합학부 교수Email verificata su ulsan.ac.kr
- Khaled N. KhasawnehAssistant Professor, George Mason UniversityEmail verificata su gmu.edu
- Ihsen AlouaniCSIT, Queen's University Belfast, UKEmail verificata su qub.ac.uk
- Dmitry PonomarevProfessor of Computer Science, Binghamton UniversityEmail verificata su cs.binghamton.edu
- Nael Abu-GhazalehUniversity of California, RiversideEmail verificata su cs.ucr.edu
- Lei YuDepartment of Computer Science, Binghamton UniversityEmail verificata su cs.binghamton.edu
- Abraham Peedikayil KuruvilaThe University of Texas at DallasEmail verificata su utdallas.edu
- Kanad Basu (কণাদ বসু)University of Texas at DallasEmail verificata su utdallas.edu
- Iqbal H Sarker, PhDCUET | Swinburne University | Cyber Security CRC | ECU, AustraliaEmail verificata su ecu.edu.au
- Md Hasan FurhadSenior Cyber security AdvisorEmail verificata su deloitte.com.au
- Rafiqul Islam, PhDDhaka University of Engineering & Technology, GazipurEmail verificata su duet.ac.bd
- Fahmid Al Farid, PhDPostdoctoral Scientist (Multimedia University), MS Eng.(University of Ulsan)Email verificata su ieee.org