Get my own profile
Public access
View all12 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
- Shannon Amerilda ScielzoUT SouthwesternVerified email at utsouthwestern.edu
- Sovantharith SengRochester Institute of TechnologyVerified email at rit.edu
- S. M. Taiabul HaqueAssociate Professor, BRAC UniversityVerified email at bracu.ac.bd
- Kelly CaineProfessor, Clemson UniversityVerified email at clemson.edu
- Susan E McGregorData Science Institute, Columbia UniversityVerified email at columbia.edu
- Elizabeth Anne WatkinsResearch Scientist, Intel Labs Intelligent Systems Research (ISR)Verified email at intel.com
- Franziska RoesnerProfessor, Paul G. Allen School of Computer Science & Engineering, Univ. of WashingtonVerified email at cs.washington.edu
- Priyank ChandraUniversity of TorontoVerified email at utoronto.ca
- Sharifa SultanaAssistant Professor, Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
- Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
- Ruj AkavipatKasetsart UniversityVerified email at ku.th
- MD Romael HaqueVisiting Assistant Professor, Purdue University Fort WayneVerified email at purdue.edu
- Shion GuhaUniversity of TorontoVerified email at utoronto.ca
- Md Rakib HasanPhD Student, Louisiana State UniversityVerified email at cct.lsu.edu
- Mehrab ShahriarMicrosoft, University of Texas at ArlingtonVerified email at mavs.uta.edu
Follow
Mahdi Nasrullah Al-Ameen
Associate Professor, Department of Computer Science, Utah State University
Verified email at usu.edu - Homepage