Crea il mio profilo
Coautori
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphEmail verificata su uoguelph.ca
- Reza JavidanProfessor of Computer Engineering and IT Department, Shiraz University of TechnologyEmail verificata su sutech.ac.ir
- Hamid Reza BoveiriShoushtar Branch, IAU, Shoushtar, IranEmail verificata su samashoushtar.ac.ir
- Marzieh AhmadzadehYork UniversityEmail verificata su yorku.ca
- Sajad HomayounPostdoc Researcher, Denmark Technical University (DTU)Email verificata su dtu.dk
- Sattar HashemiProfessor of Artificial Intelligence, Shiraz UniversityEmail verificata su shirazu.ac.ir
- Hamed HaddadPajouhUniversity of GuelphEmail verificata su uoguelph.ca
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Mohammad Javad SoboutiPh.D in Computer Engineering, Ferdowsi University of MashhadEmail verificata su mail.um.ac.ir
- Koorush ZiaratiShiraz UniversityEmail verificata su shirazu.ac.ir
- Nader ZareResearch assistant at Dalhouise UniversityEmail verificata su dal.ca
- Hojjat AdeliThe Ohio State UniversityEmail verificata su osu.edu
- Elham ParvinniaDepartment of computer engineering , Shiraz branch, Islamic Azad university, Shiraz, Iran