Crea il mio profilo
Accesso pubblico
Visualizza tutto76 articoli
7 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Kemal AkkayaProfessor of Computer Science, Florida International UniversityEmail verificata su fiu.edu
- Hidayet AksuGoogleEmail verificata su google.com
- Leonardo BabunSenior Cybersecurity Researcher at the Johns Hopkins University Applied Physics LaboratoryEmail verificata su jhuapl.edu
- Abbas AcarFlorida International UniversityEmail verificata su fiu.edu
- Amit Kumar SikderResearch Scientist IEmail verificata su gatech.edu
- Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringEmail verificata su ece.gatech.edu
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleEmail verificata su math.unipd.it
- Ahmet ArışSecurity Engineer at BeyondTrustEmail verificata su beyondtrust.com
- John A. CopelandProfessor Emeritus, Ga. Tech, ECEEmail verificata su ece.gatech.edu
- Z. Berkay CelikAssistant Professor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonEmail verificata su cs.wisc.edu
- Enes ErdinUniversity of Central ArkansasEmail verificata su uca.edu
- mumin cebeMarquette UniversityEmail verificata su marquette.edu
- Nico SaputroParahyangan Catholic UniversityEmail verificata su unpar.ac.id
- Mohammad Ashiqur RahmanFlorida International UniversityEmail verificata su fiu.edu
- Kyle DenneyFlorida International UniversityEmail verificata su fiu.edu
- Luis Puche RondonPhD Student, Florida International UniversityEmail verificata su fiu.edu
- AKM Iqtidar NewazLecturer, North South UniversityEmail verificata su northsouth.edu
- Ismail GuvencNorth Carolina State UniversityEmail verificata su ncsu.edu
- Abdullah AYDEGERComputer Science, Florida Institute of TechnologyEmail verificata su fit.edu