Get my own profile
Public access
View all8 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Dr. Sunny BehalAssociate Professor, Shaheed Bhagat Singh State University-FerozepurVerified email at sbsstc.ac.in
- Xenofon KoutsoukosVanderbilt UniversityVerified email at vanderbilt.edu
- Irfan AhmedVirginia Commonwealth UniversityVerified email at vcu.edu
- Fathi AmsaadWright State UniversityVerified email at wright.edu
- Xenia MountrouidouSenior Security Researcher, Cyber adAPTVerified email at cyberadapt.com
- Greg GagneProfessor of Computer Science, Westminster CollegeVerified email at westminstercollege.edu
- Nicoleta Liviana TudorPetroleum-Gas University of Ploiesti, RomaniaVerified email at upg-ploiesti.ro
- Chadi KariAssociate Professor of Computer Science, University of the PacificVerified email at pacific.edu
- Timothy T. YuenUniversity of Texas at San AntonioVerified email at utsa.edu
- Keith StoufferNational Institute of Standards and TechnologyVerified email at nist.gov
- Goncalo MartinsUniversity of Denver (USA)Verified email at du.edu
- Richard CandellNational Institute of Standards and TechnologyVerified email at nist.gov
- David VosenThe College of St. ScholasticaVerified email at css.edu
- Mohammad Q. Azhar, PhDBMCC, The City University Of New YorkVerified email at bmcc.cuny.edu
- Sahaj SaxenaThapar Institute of Engineering and TechnologyVerified email at thapar.edu
- Nishchal KushQueensland University of TechnologyVerified email at kush.com.fj
- Akande AyodejiMasters of Information Technology, QUTVerified email at griffithuni.edu.au
- Fekadu YihunieCybersecurityVerified email at mail.sacredheart.edu
- Mohamed BazaCollege of CharlestonVerified email at cofc.edu
- ABDUL RAZAQUEResearcherVerified email at my.bridgeport.edu