Crea il mio profilo
Accesso pubblico
Visualizza tutto93 articoli
33 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Xueping Susan LiangFlorida International UniversityEmail verificata su fiu.edu
- Charles KamhouaTeam Leader, Adversarial Resilient Cyber Methodology, DEVCOM Army Research LaboratoryEmail verificata su army.mil
- Laurent NjillaUS. Air Force Research LaboratoryEmail verificata su us.af.mil
- Deepak K. ToshAssistant ProfessorEmail verificata su utep.edu
- Peter FoytikODU VMASCEmail verificata su odu.edu
- Min SongStevens Institute of TechnologyEmail verificata su Stevens.edu
- Juan (Wendy) ZhaoDirector, Data Science at American Heart AssociationEmail verificata su heart.org
- Uttam GhoshAssociate Professor, Meharry School of Applied Computer Sciences, Meharry Medical CollegeEmail verificata su mmc.edu
- Hellen MazikuUniversity of Dar es SalaamEmail verificata su udsm.ac.tz
- Kamrul HasanAssistant Professor of Cybersecurity, Tennessee State University, Nashville, TNEmail verificata su tnstate.edu
- Pushpita ChatterjeeMeharry Medical CollegeEmail verificata su mmc.edu
- Nghi H. TranUniversity of AkronEmail verificata su uakron.edu
- CHUNSHENG XINOld Dominion UniversityEmail verificata su odu.edu
- Taiwo OyedareVirginia TechEmail verificata su vt.edu
- biswajit biswalAssociate Professor of Computer Science, South Carolina State UniversityEmail verificata su scsu.edu
- David NicolWilliam and Mary, Dartmouth, University of IllinoisEmail verificata su illinois.edu
- Robi PolikarProfessor of Electrical and Computer Engineering, Rowan University, Glassboro, NJ, USAEmail verificata su rowan.edu
- L.H. KeelTennessee State UniversityEmail verificata su tnstate.edu
- Trung Q. DuongCanada Excellence Research Chair at Memorial University, adjunct Prof. at Queen's University BelfastEmail verificata su mun.ca
- Kauser JahanCivil engineering. Rowan UniversityEmail verificata su rowan.edu