Crea il mio profilo
Accesso pubblico
Visualizza tutto76 articoli
48 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Laurent NjillaUS. Air Force Research LaboratoryEmail verificata su us.af.mil
- Sachin ShettyOld Dominion UniversityEmail verificata su odu.edu
- Deepak K. ToshAssistant ProfessorEmail verificata su utep.edu
- Ahmed H. Anwar, (Ahmed Hemida)Research Scientist, DEVCOM ARLEmail verificata su knights.ucf.edu
- Nandi LesliePrincipal Technical Fellow, RTXEmail verificata su rtx.com
- David MohaisenProfessor of Computer Science, University of Central FloridaEmail verificata su ucf.edu
- Xueping Susan LiangFlorida International UniversityEmail verificata su fiu.edu
- Christopher KiekintveldUniversity of Texas at El PasoEmail verificata su utep.edu
- Muhammad SaadX (formerly Twitter)Email verificata su knights.ucf.edu
- SHAMIK SENGUPTAExecutive Director, UNR Cybersecurity Center & Professor of Computer Science and Engineering Dept.Email verificata su unr.edu
- Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityEmail verificata su syr.edu
- DaeHun NyangEwha Womans UniversityEmail verificata su ewha.ac.kr
- Jin-Hee ChoComputer Science Department, Virginia TechEmail verificata su vt.edu
- Danda B. RawatProfessor of ECE & CS, Howard UniversityEmail verificata su howard.edu
- Jeffrey SpauldingAdjunct Professor, Canisius CollegeEmail verificata su canisius.edu
- Zelin WanDepartment of Computer Science, Virginia TechEmail verificata su vt.edu
- Mu ZhuNorth Carolina State UniversityEmail verificata su ncsu.edu
- Sundararaja Sitharama IyengarProfessor of Computer Science, Florida International UniversityEmail verificata su cis.fiu.edu
- Mainak ChatterjeeApple Inc.Email verificata su apple.com
- Fei FangCarnegie Mellon UniversityEmail verificata su cmu.edu
Segui
Charles Kamhoua
Team Leader, Adversarial Resilient Cyber Methodology, DEVCOM Army Research Laboratory
Email verificata su army.mil