Get my own profile
Co-authors
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
- Reza JavidanProfessor of Computer Engineering and IT Department, Shiraz University of TechnologyVerified email at sutech.ac.ir
- Hamid Reza BoveiriShoushtar Branch, IAU, Shoushtar, IranVerified email at samashoushtar.ac.ir
- Marzieh AhmadzadehYork UniversityVerified email at yorku.ca
- Sajad HomayounPostdoc Researcher, Denmark Technical University (DTU)Verified email at dtu.dk
- Sattar HashemiProfessor of Artificial Intelligence, Shiraz UniversityVerified email at shirazu.ac.ir
- Hamed HaddadPajouhUniversity of GuelphVerified email at uoguelph.ca
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Mohammad Javad SoboutiPh.D in Computer Engineering, Ferdowsi University of MashhadVerified email at mail.um.ac.ir
- Koorush ZiaratiShiraz UniversityVerified email at shirazu.ac.ir
- Nader ZareResearch assistant at Dalhouise UniversityVerified email at dal.ca
- Hojjat AdeliThe Ohio State UniversityVerified email at osu.edu
- Elham ParvinniaDepartment of computer engineering , Shiraz branch, Islamic Azad university, Shiraz, Iran