Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Byron J. WilliamsUniversity of FloridaVerified email at cise.ufl.edu
- Alan DombkowskiWayne State UniversityVerified email at wayne.edu
- Douglas CraigEmergency Medicine Research, University of MichiganVerified email at med.umich.edu
- Zadia CodabuxUniversity of SaskatchewanVerified email at ieee.org
- Hasan JamilProfessor of Computer Science, University of IdahoVerified email at uidaho.edu
- Zalia ShamsMicrosoftVerified email at microsoft.com
- Rajshakhar PaulPhD Candidate, Department of Computer Science, Wayne State UniversityVerified email at wayne.edu
- TANMAY BHOWMIKMississippi State UniversityVerified email at msstate.edu
- Dr. Deb KaushikProfessor, Dept. of CSE, Chittagong University of Engineering & Technology (CUET)Verified email at cuet.ac.bd
- Shahina FerdousSoftware Engineer, MicrosoftVerified email at microsoft.com
- Md. Saidur RahmanProfessor, Dept. of Computer Science and Engineering, BUET, Dhaka-1000Verified email at cse.buet.ac.bd
- Iqbal H Sarker, PhDCUET | Swinburne University | University of Technology Sydney | Cyber Security CRC | ECU, AustraliaVerified email at ecu.edu.au