Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Rohit ValechaAssociate Professor of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at utsa.edu
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
- Peyman Najafirad (Paul Rad)University of Texas at San AntonioVerified email at utsa.edu
- Yu ChenProfessor at Dept. of Electrical & Computer Engr, Binghamton University, SUNYVerified email at binghamton.edu
- Ekrem KarakoçBinghamton University (SUNY)Verified email at binghamton.edu
- Seden AkcinarogluBinghamton UniversityVerified email at binghamton.edu
- Govind HariharanKennesaw State UniversityVerified email at kennesaw.edu
- Naga VempralaUniversity of PortlandVerified email at up.edu
- Pranali MandaokarThe University of Texas at San AntonioVerified email at utsa.edu
- Oluwafemi (Femi) AkanfeUniversity of Alabama at Birmingham, Collat School of BusinessVerified email at uab.edu
- Bao DoComputer Science Center, University of Science, Vietnam National Unviersity, Ho Chi Minh CityVerified email at csc.hcmus.edu.vn
- Sumantra SarkarAssociate Professor, SUNY, BinghamtonVerified email at binghamton.edu
Follow
Thi Tran
Binghamton University, SUNY, School of Management
Verified email at binghamton.edu - Homepage