Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Mukesh SinghalUniversity of California, MercedVerified email at ucmerced.edu
- Shafika Showkat MoniAssistant ProfessorVerified email at erau.edu
- Ayesha Siddiqua DinaAssistant ProfessorVerified email at floridapoly.edu
- baban mahmoodKirkuk University-College of Computer Science and Information Technology- Network DeparmentVerified email at uokirkuk.edu.iq
- Kiho LimAssociate Professor, William Paterson University of New JerseyVerified email at wpunj.edu
- Hassan MistareehiAssistant Professor, Computer Science and Information Systems, Murray State UniversityVerified email at murraystate.edu
- AB SiddiqueUniversity of KentuckyVerified email at cs.uky.edu
- Loren SchwiebertProfessor of Computer Science, Wayne State UniversityVerified email at wayne.edu
- Robert H.B. NetzerVerified email at bolabs.com
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
- Stephen HaryAir Force Research LaboratoryVerified email at ieee.org
- Raphael FinkelProfessor of Compuer Science, University of KentuckyVerified email at cs.uky.edu
- Haythem A. Bany SalamehProfessor of Electrical and Computer Engineering, Al Ain University of Science & TechnologyVerified email at aau.ac.ae
- Chi ZhangSchool of Biological Sciences, University of Nebraska, Lincoln, NEVerified email at unl.edu
- Chen QianProfessor, University of California Santa CruzVerified email at ucsc.edu
- Fangming LiuProfessor, School of Computer Science & Technology, Huazhong University of Science & TechnologyVerified email at mail.hust.edu.cn
- Guihai ChenProfessor of Computer ScienceVerified email at nju.edu.cn