Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Stephan OlariuOld Dominion UniversityVerified email at odu.edu
- M. Hossain HeydariProfessor of Computer Science, James Madison UniversityVerified email at jmu.edu
- Ahmad SalmanJames Madison UniversiyVerified email at jmu.edu
- B. Brian ParkUniversity of VirginiaVerified email at virginia.edu
- Ismail AraiNara Institute of Science and TechnologyVerified email at itc.naist.jp
- MOHAMMAD S ALMALAGChristopher Newport UniversityVerified email at cnu.edu
- Aida GhazizadehOld Dominion UniversityVerified email at odu.edu
- Puya GhazizadehAssistant Professor, St John's UniversityVerified email at stjohns.edu
- Amr HILALTennessee TechVerified email at tntech.edu
- Sevinj IskandarovaBridgewater CollegeVerified email at dukes.jmu.edu
- Nathan SpragueJames Madison UniversityVerified email at jmu.edu
- Dimitrie C. PopescuProfessor of Electrical and Computer Engineering, Old Dominion UniversityVerified email at odu.edu
- Mauricio TellezLead Security Consultant, Verizon EnterpriseVerified email at verizon.com
- Dr Otilia PopescuAssociate Professor, Old Dominion UniversityVerified email at odu.edu
- Ahmed AlhafdhiVerified email at nu.edu.sa
- Mohamed WatfaProfessor of Computer Science, Lebanese American University (LAU), LebanonVerified email at LAU.edu.lb
- Danda B. RawatProfessor of ECE & CS, Howard UniversityVerified email at howard.edu
- Farzana RahmanSyracuse UniversityVerified email at syr.edu
- Michele SegataTenure-track Assistant Professor, DISI, University of TrentoVerified email at unitn.it
- Michele C. WeigleProfessor of Computer Science, Old Dominion UniversityVerified email at cs.odu.edu