Crea il mio profilo
Accesso pubblico
Visualizza tutto38 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- mo jamshidiThe University of Texas, San AntonioEmail verificata su utsa.edu
- Arun DasPostdoctoral Associate at University of Pittsburgh Medical Center (UPMC)Email verificata su pitt.edu
- Sos AgaianDistinguished Professor ,Computer Sciences , CUNY Graduate Center &CSIEmail verificata su csi.cuny.edu
- Nicole BeebeProfessor, The University of Texas at San AntonioEmail verificata su utsa.edu
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioEmail verificata su buffalo.edu
- Yufei HuangUniversity of Pittsburg Medical CenterEmail verificata su pitt.edu
- John QuarlesProfessor of Computer Science, University of Texas at San AntonioEmail verificata su cs.utsa.edu
- Thi TranBinghamton University, SUNY, School of ManagementEmail verificata su binghamton.edu
- Kevin DesaiUniversity of Texas at San AntonioEmail verificata su utsa.edu
- Adel AlaeddiniAssociate Professor of Mechanical Engineering, University of Texas at San Antonio (UTSA)Email verificata su utsa.edu
- Paul RuthRENCI - UNC Chapel HillEmail verificata su renci.org
- Anthony RiosAssistant Professor in Information Systems and Cyber SecurityEmail verificata su utsa.edu
- Gonzalo De La Torre ParraAssistant Professor in Cyber Security Systems, The University of the Incarnate Word