Get my own profile
Public access
View all78 articles
39 articles
available
not available
Based on funding mandates
Co-authors
- Xueping Susan LiangFlorida International UniversityVerified email at fiu.edu
- Charles KamhouaDEVCOM Army Research Laboratory, Network Security BranchVerified email at army.mil
- Laurent NjillaUS. Air Force Research LaboratoryVerified email at us.af.mil
- Deepak K. ToshAssistant ProfessorVerified email at utep.edu
- Peter FoytikODU VMASCVerified email at odu.edu
- Juan (Wendy) ZhaoDirector, Data Science at American Heart AssociationVerified email at heart.org
- Uttam GhoshAssociate Professor, Meharry School of Applied Computer Sciences, Meharry Medical CollegeVerified email at mmc.edu
- Hellen MazikuUniversity of Dar es SalaamVerified email at udsm.ac.tz
- Kamrul Hasan, Ph.D.Assistant Professor of Cybersecurity, Tennessee State University, Nashville, TNVerified email at tnstate.edu
- Pushpita ChatterjeeHoward UniversityVerified email at howard.edu
- Nghi H. TranUniversity of AkronVerified email at uakron.edu
- CHUNSHENG XINOld Dominion UniversityVerified email at odu.edu
- Taiwo OyedareVirginia TechVerified email at vt.edu
- biswajit biswalAssociate Professor of Computer Science, South Carolina State UniversityVerified email at scsu.edu
- David NicolWilliam and Mary, Dartmouth, University of IllinoisVerified email at illinois.edu
- Kauser JahanCivil engineering. Rowan UniversityVerified email at rowan.edu
- Robi PolikarProfessor of Electrical and Computer Engineering, Rowan University, Glassboro, NJ, USAVerified email at rowan.edu
- L.H. KeelTennessee State UniversityVerified email at tnstate.edu
- Trung Q. DuongCanada Excellence Research Chair at Memorial University, adjunct Prof. at Queen's University BelfastVerified email at mun.ca
- Richard J. KozickBucknell UniversityVerified email at bucknell.edu