Get my own profile
Public access
View all1 article
2 articles
available
not available
Based on funding mandates
Co-authors
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
- Yousra JavedAssociate Professor of Cybersecurity, Illinois State UniversityVerified email at ilstu.edu
- Gail-Joon AhnArizona State UniversityVerified email at asu.edu
- Fadi MohsenUniversity of GroningenVerified email at rug.nl
- Said M. MaroufPh.D, iOS and Mac DeveloperVerified email at uncc.edu
- Abeer AlJarrahTrellixVerified email at ieee.org
- Salmin SultanaResearch Scientist, Intel LabsVerified email at intel.com
- Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
- Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteVerified email at uncc.edu
- Federica PaciDepartment of Computer Science, University of VeronaVerified email at univr.it
- Gabriel GhinitaHamad Bin Khalifa UniversityVerified email at umb.edu
- Nazmus Sakib MiaziAssistant Teaching Professor, Northeastern UniversityVerified email at northeastern.edu
- Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
- Smitha SundareswaranMeta, Microsoft, Google, Penn State UniversityVerified email at fb.com
- Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
- Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
- Andrew BesmerWinthrop UniversityVerified email at winthrop.edu
- Jinpeng WeiAssociate Professor, University of North Carolina at CharlotteVerified email at uncc.edu
- Bojan CukicProfessor and Dean, College of Computing and Informatics, University of North Carolina at CharlotteVerified email at charlotte.edu
Follow
Mohamed Shehab
Professor, University of North Carolina at Charlotte
Verified email at uncc.edu - Homepage