Get my own profile
Public access
View all29 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Ehab Al-ShaerCarnegie Mellon UniversityVerified email at cmu.edu
- AHM JakariaComputer Science, Tennessee Tech UniversityVerified email at students.tntech.edu
- Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
- Selcuk UluagacFlorida International UniversityVerified email at fiu.edu
- Hossain ShahriarProfessor, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
- Padmalochan BeraAssociate Professor, Dept of Computer Science and EngineeringVerified email at iitbbs.ac.in
- Kemal AkkayaProfessor of Computer Science, Florida International UniversityVerified email at fiu.edu
- Sheikh Iqbal AhamedMarquette University, USAVerified email at marquette.edu
- AKM Iqtidar NewazLecturer, North South UniversityVerified email at northsouth.edu
- Carol FungAssociate Professor at Concordia UniversityVerified email at concordia.ca
- Madhukrishna PriyadarsiniIndian Institute of Technology BhubaneswarVerified email at iitbbs.ac.in
- Abdullah AYDEGERComputer Science, Florida Institute of TechnologyVerified email at fit.edu
- Zahid AnwarNorth Dakota State University, USAVerified email at ndsu.edu
- Rajesh KavasseriAssociate Dean for Research, JJ Lohr College of Engineering, South Dakota State UniversityVerified email at sdstate.edu
- Bahman RashidiPhD in Computer ScienceVerified email at vcu.edu
- Rahat MasumSoftware Engineer, Oracle Cloud Infrastructure | Masters in Computer Science, TennesseeVerified email at students.tntech.edu
- Mohamed M. E. A. MahmoudTennessee Tech UniversityVerified email at tntech.edu
- Muhammad IsmailDirector of CEROC and Associate Professor of Computer Science, Tennessee Tech UniversityVerified email at tntech.edu
- Erchin Serpedin, PhDProfessor, Texas A&M University, Dept. of Electrical and Computer Engineering, College Station, TXVerified email at ece.tamu.edu
- Nico SaputroParahyangan Catholic UniversityVerified email at unpar.ac.id