Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Lingyu WangProfessor, Concordia UniversityVerified email at ciise.concordia.ca
- Mourad DebbabiDean, Professor, Hydro-Québec Hitachi Research Chair, Concordia UniversityVerified email at concordia.ca
- Makan PourzandiAffiliate Professor, Concordia University - Ericsson ResearchVerified email at concordia.ca
- Yosr JarrayaMaster Researcher, Ericsson Canada, Research SecurityVerified email at ericsson.com
- Suryadipta MajumdarAssociate Professor of Concordia Institute for Information Systems Engineering, Concordia UniversityVerified email at concordia.ca
- momen oqailyCIISE, Concordia universityVerified email at live.concordia.ca
- Taous MadiResearch Scientist, KAUSTVerified email at kaust.edu.sa
- Mengyuan ZhangVrije Universiteit AmsterdamVerified email at vu.nl
- Meisam MohammadyAssistant Professor at Iowa State UniversityVerified email at iastate.edu
- Hyame Assem AlameddineEricsson Security ResearchVerified email at ericsson.com
- Raouf BoutabaProfessor of Computer Science, University of WaterlooVerified email at uwaterloo.ca
- Mohammad Ali SalahuddinUniversity of WaterlooVerified email at ieee.org
- Onur DumanKristiania University CollegeVerified email at Kristiania.no
- Mohammad Ekramul KabirAssistant Professor, University Canada West, Vancouver, CanadaVerified email at ucanwest.ca
Follow
Azadeh Tabiban
Assistant Professor in Computer Science Department, University of Manitoba
Verified email at umanitoba.ca - Homepage