Get my own profile
Public access
View all35 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Laurie WilliamsNorth Carolina State University Distinguished University Professor, IEEE Fellow, ACM FellowVerified email at csc.ncsu.edu
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
- Chris ParninMicrosoftVerified email at microsoft.com
- Farzana Ahamed BhuiyanGraduate Assistant, Tennessee Tech UniversityVerified email at students.tntech.edu
- DIBYENDU BRINTO BOSEGraduate StudentVerified email at vt.edu
- Rahul KrishnaResearch Staff Member :: IBM Research, Yorktown Heights, NYVerified email at ibm.com
- Nasif ImtiazNorth Carolina State UniversityVerified email at ncsu.edu
- Tim MenziesNorth Carolina State University, Computer Science, IEEE Fellow, ASE FellowVerified email at ncsu.edu
- Mahmuda NazninProfessor of Computer Science and Engineering, Bangladesh University of Engineering and TechnologyVerified email at cse.buet.ac.bd
- Atiqul MollahCornelis NetworksVerified email at cornelisnetworks.com