Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
- Muhaiminul Islam AdnanLecturer in MathematicsVerified email at ins.uiu.ac.bd
- Sheikh Iqbal AhamedMarquette University, USAVerified email at marquette.edu
- Mingon KangUniversity of Nevada, Las VegasVerified email at unlv.edu
- Alfredo CuzzocreaDistinguished Professor of Computer Engineering, University of Calabria, ItalyVerified email at si.dimes.unical.it
- Sai Chandra KosarajuPhD candidate at university of nevada, Las vegas (UNLV)Verified email at unlv.edu
- Tasmia AqilaGraduate Teaching Assistant,Florida International UniversityVerified email at fiu.edu
- Ananda MondalComputing and Information Sciences, Florida International UniversityVerified email at fiu.edu
- Md Shafiul AlamKennesaw State UniversityVerified email at students.kennesaw.edu
- Sweta SnehaProfessor of Information SystemsVerified email at kennesaw.edu
- WenZhan SongGeorgia Power Mickey A. Brown Professor, Computer Engineering, University of GeorgiaVerified email at uga.edu
- Mohammed Rahim Uddin ChowdhuryAssistant Professor of Decision Sciences, WIUVerified email at gwmail.gwu.edu