Crea il mio profilo
Accesso pubblico
Visualizza tutto5 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Raouf BoutabaProfessor of Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Reaz AhmedPhD (UWaterloo)Email verificata su google.com
- Shihabur Rahman ChowdhuryApple Inc.Email verificata su apple.com
- Mohamed Faten ZhaniISITCom, University of Sousse, TunisiaEmail verificata su isitc.u-sousse.tn
- Md Golam RabbaniGraduate Research and Teaching Assistant, Computer Science, University of WaterlooEmail verificata su uwaterloo.ca
- Arup Raton RoySoftware Engineering Manager, Arista NetworksEmail verificata su arista.com
- Gourab KunduUniversity of Illinois at Urbana ChampaignEmail verificata su illinois.edu
- Rifat ShahriyarProfessor, Department of CSE, BUETEmail verificata su cse.buet.ac.bd
- Lisandro Zambenedetti GranvilleFederal University of Rio Grande do SulEmail verificata su inf.ufrgs.br
- Rafael Pereira EstevesFederal Institute of Rio Grande do SulEmail verificata su restinga.ifrs.edu.br
- Md Mostofa AkbarProfessor, Dept of CSE, BUETEmail verificata su cse.buet.ac.bd
- M Sohel RahmanCSE, BUETEmail verificata su cse.buet.ac.bd
- Sheikh Iqbal AhamedMarquette University, USAEmail verificata su marquette.edu
- Mohammad Ali SalahuddinUniversity of WaterlooEmail verificata su ieee.org
- Hyame Assem AlameddineEricsson Security ResearchEmail verificata su ericsson.com
- Vahid PourahmadiEmail verificata su uwaterloo.ca
- Sirajum MunirBosch Research and Technology CenterEmail verificata su us.bosch.com
- Shahrear IqbalResearch Officer, National Research Council (NRC) CanadaEmail verificata su nrc-cnrc.gc.ca
- Md. Monirul IslamProfessor of Computer Science, BUETEmail verificata su cse.buet.ac.bd
- Kazuyuki MuraseInternational Professional University of Technology in Osaka, University of FukuiEmail verificata su u-fukui.ac.jp