Get my own profile
Public access
View all39 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Abdeltawab HendawiUniversity of Rhode Island, Computer Science and Data ScienceVerified email at uri.edu
- Walid G. ArefPurdue UniversityVerified email at purdue.edu
- Mohamed MokbelDistinguished McKnight University Professor, Comp. Sci. & Eng., Univ. of MinnesotaVerified email at cs.umn.edu
- Badrish ChandramouliMicrosoft ResearchVerified email at microsoft.com
- Ibrahim KamelUniversity of Sharjah, Professor Electrical & Computer Engineering, Director Institute of LeadershipVerified email at sharjah.ac.ae
- Mohamed EltabakhPrincipal Scientis at QCRI QatarVerified email at wpi.edu
- Yasin SilvaLoyola University ChicagoVerified email at luc.edu
- Cyrus ShahabiProfessor of Computer Science, University of Southern CaliforniaVerified email at usc.edu
- David MaierProfessor of Computer Science, Portland State UniversityVerified email at cs.pdx.edu
- Raja BoseMicrosoft Silicon ValleyVerified email at microsoft.com
- Ihab F. IlyasUniversity of WaterlooVerified email at uwaterloo.ca
- Thanaa GhanemMetropolitan State UniversityVerified email at metrostate.edu
- Jie BaoJDTVerified email at jd.com
- Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityVerified email at northeastern.edu
- Sumi HelalProfessor, University of FloridaVerified email at ufl.edu
- Anas BasalamahAssociate Professor at Umm Al Qura UniversityVerified email at uqu.edu.sa
- Mohamed A. IsmailProfessor of Computer Science, Alexandria University, Faculty of Engineering,Verified email at alexu.edu.eg
- Steven DruckerMicrosoft ResearchVerified email at microsoft.com
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Anderson C. A. NascimentoHead of Security Research - VisaVerified email at visa.com