Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mohamed ShehabProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
- Muhammad Murtaza KhanNational University of Sciences and TechnologyVerified email at seecs.edu.pk
- Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
- James NicholsonAssociate Professor, Northumbria UniversityVerified email at northumbria.ac.uk
- Matt DixonNorthumbria UniversityVerified email at northumbria.ac.uk
- Opeyemi Dele-Ajayi Ph.DResearch@MetaVerified email at meta.com
- Toni PerkovićUniversity of Split, FESB unist.hrVerified email at fesb.hr
- Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
- Hassan KhanUniversity of GuelphVerified email at uoguelph.ca
- Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteVerified email at uncc.edu
- Jocelyn ChanussotINRIA, on leave from Grenoble INPVerified email at grenoble-inp.fr
- Mary Lou MaherUNC CharlotteVerified email at uncc.edu
Follow
Yousra Javed
Associate Professor of Cybersecurity, Illinois State University
Verified email at ilstu.edu - Homepage