Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
- Yuan ChengGrand Valley State UniversityVerified email at gvsu.edu
- Dang NguyenAmazon Web ServicesVerified email at my.utsa.edu
- Xinwen ZhangHiretualVerified email at hiretual.com
- Maanak GuptaAssistant Professor, Tennessee Tech UniversityVerified email at tntech.edu
- Smriti BhattPurdue UniversityVerified email at purdue.edu
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Gabriel GhinitaHamad Bin Khalifa UniversityVerified email at umb.edu
- Murat KantarciogluProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Tahmina AhmedPhD, Department of Computer Science,University of Texas a San AntonioVerified email at my.utsa.edu
- Khalid BijonSnowflakeVerified email at snowflake.com
- Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu