Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mohamed ShehabProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Muhammad Murtaza KhanNational University of Sciences and TechnologyVerified email at seecs.edu.pk
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
James NicholsonAssociate Professor, Northumbria UniversityVerified email at northumbria.ac.uk
Matt DixonNorthumbria UniversityVerified email at northumbria.ac.uk
Opeyemi Dele-Ajayi Ph.DResearch@MetaVerified email at meta.com
Toni PerkovićUniversity of Split, FESB unist.hrVerified email at fesb.hr
Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Hassan KhanUniversity of GuelphVerified email at uoguelph.ca
Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteVerified email at uncc.edu
Jocelyn ChanussotINRIA, on leave from Grenoble INPVerified email at grenoble-inp.fr
Mary Lou MaherUNC CharlotteVerified email at uncc.edu
Follow![Yousra Javed](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=hoxGszUAAAAJ&citpid=24)
Yousra Javed
Associate Professor of Cybersecurity, Illinois State University
Verified email at ilstu.edu - Homepage