Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Benjamin SchooleyAssociate Professor IT & CybersecurityVerified email at byu.edu
- Alberto Quattrini LiAssociate Professor of Computer Science, Dartmouth CollegeVerified email at dartmouth.edu
- Marios XanthidisResearch Scientist, SINTEF OceanVerified email at sintef.no
- Ioannis RekleitisProfessor at the Computer Science and Engineering, University of South CarolinaVerified email at cse.sc.edu
- Jason O'KaneProfessor of Computer Science, Texas A&M UniversityVerified email at tamu.edu
- Md ModasshirUniversity of South CarolinaVerified email at email.sc.edu
- Adem CoskunUniversity of South CarolinaVerified email at email.sc.edu
- shervin ghasemlouResearch Scientist, AI at MetaVerified email at meta.com
- Neset Hikmet, Ph.D.College of Engineering and Computing, University of South CarolinaVerified email at cec.sc.edu
- Sharmin RahmanAmazonVerified email at amazon.com
- Sue P. HeineyUniversity of South CarolinaVerified email at mailbox.sc.edu
- Sara DonevantUniversity of South Carolina College of NursingVerified email at mailbox.sc.edu
- Robert G BrookshireUniversity of South CarolinaVerified email at sc.edu
- john m brooksuniversity of south carolinaVerified email at sc.edu
- Jingxi ShengAssistant Professor, University of Wisconsin-MadisonVerified email at wisc.edu
- Sarah B. FloydAssistant Professor, Clemson UniversityVerified email at clemson.edu
- Sue LevkoffUniversity of South CarolinaVerified email at mailbox.sc.edu
- Kristen D. SeayAssociate Professor, University of South CarolinaVerified email at mailbox.sc.edu
- Amanda Stafford McRellPhD Candidate, University of South CarolinaVerified email at email.sc.edu
- Jignya PatelAssistant Professor of Information Systems, Florida Institute of TechnologyVerified email at go.fit.edu
Follow