Get my own profile
Public access
View all6 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Issa TraoreProfessor, ECE Department, University of VictoriaVerified email at ece.uvic.ca
- Wei LuProfessor of Computer Science, Keene State College/USNHVerified email at keene.edu
- Marcelo Luiz BrocardoProfessorVerified email at uvic.ca
- arunita jaekelWindsorVerified email at uwindsor.ca
- Dan GarantMassMutualVerified email at massmutual.com
- Luis RuedaProfessor, School of Computer Science, University of WindsorVerified email at uwindsor.ca
- Mohammad MamunResearch Officer, National Research Council CanadaVerified email at nrc-cnrc.gc.ca
- Youssef NAKKABIVerified email at plurilock.com
- Asem GhalebSecurity ResearcherVerified email at ece.ubc.ca
- Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
- Mohiuddin AhmedSenior Lecturer of Computing & Security at Edith Cowan University, IEEE Senior MemberVerified email at ecu.edu.au
- Brijesh JethvaUniversity of VictoriaVerified email at uvic.ca
- Sanjay Kumar Dhurandher, Senior Me...Professor, Netaji Subhas University of Technology, New Delhi, IndiaVerified email at nsut.ac.in
- Shady MohammedDep. of Software Engineering, Faculty of Computer Science and Information Technology, Ahram CanadianVerified email at acu.edu.eg
- Isaac WoungangToronto Metropolitan University (TMU)