Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Dr Md Anisur RahmanLecturer in Business Analytics, La Trobe Business School, La Trobe UniversityVerified email at latrobe.edu.au
- Jongmyon Kim울산대 IT융합학부 교수Verified email at ulsan.ac.kr
- Khaled N. KhasawnehAssistant Professor, George Mason UniversityVerified email at gmu.edu
- Ihsen AlouaniCSIT, Queen's University Belfast, UKVerified email at qub.ac.uk
- Abraham Peedikayil KuruvilaThe University of Texas at DallasVerified email at utdallas.edu
- Dmitry PonomarevProfessor of Computer Science, Binghamton UniversityVerified email at cs.binghamton.edu
- Nael Abu-GhazalehUniversity of California, RiversideVerified email at cs.ucr.edu
- Kanad Basu (কণাদ বসু)University of Texas at DallasVerified email at utdallas.edu
- Lei YuDepartment of Computer Science, Binghamton UniversityVerified email at cs.binghamton.edu
- Iqbal H Sarker, PhDCUET | Swinburne University | Cyber Security CRC | ECU, AustraliaVerified email at ecu.edu.au
- Md Hasan FurhadSenior Cyber security AdvisorVerified email at deloitte.com.au
- Rafiqul Islam, PhDDhaka University of Engineering & Technology, GazipurVerified email at duet.ac.bd
- Fahmid Al Farid, PhDPostdoctoral Scientist (Multimedia University), MS Eng.(University of Ulsan)Verified email at ieee.org