Crea il mio profilo
Accesso pubblico
Visualizza tutto39 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Abdeltawab HendawiUniversity of Rhode Island, Computer Science and Data ScienceEmail verificata su uri.edu
- Walid G. ArefPurdue UniversityEmail verificata su purdue.edu
- Mohamed MokbelDistinguished McKnight University Professor, Comp. Sci. & Eng., Univ. of MinnesotaEmail verificata su cs.umn.edu
- Badrish ChandramouliMicrosoft ResearchEmail verificata su microsoft.com
- Ibrahim KamelUniversity of Sharjah, Professor Electrical & Computer Engineering, Director Institute of LeadershipEmail verificata su sharjah.ac.ae
- Mohamed EltabakhPrincipal Scientis at QCRI QatarEmail verificata su wpi.edu
- Yasin SilvaLoyola University ChicagoEmail verificata su luc.edu
- Cyrus ShahabiProfessor of Computer Science, University of Southern CaliforniaEmail verificata su usc.edu
- David MaierProfessor of Computer Science, Portland State UniversityEmail verificata su cs.pdx.edu
- Raja BoseMicrosoft Silicon ValleyEmail verificata su microsoft.com
- Ihab F. IlyasUniversity of WaterlooEmail verificata su uwaterloo.ca
- Thanaa GhanemMetropolitan State UniversityEmail verificata su metrostate.edu
- Jie BaoJDTEmail verificata su jd.com
- Cristina Nita-RotaruProfessor, Khoury College of Computer Science, Northeastern UniversityEmail verificata su northeastern.edu
- Sumi HelalProfessor, University of FloridaEmail verificata su ufl.edu
- Anas BasalamahAssociate Professor at Umm Al Qura UniversityEmail verificata su uqu.edu.sa
- Mohamed A. IsmailProfessor of Computer Science, Alexandria University, Faculty of Engineering,Email verificata su alexu.edu.eg
- Steven DruckerMicrosoft ResearchEmail verificata su microsoft.com
- Elisa BertinoProfessor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Anderson C. A. NascimentoHead of Security Research - VisaEmail verificata su visa.com