Get my own profile
Public access
View all18 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Robert AbercrombiePrime Time Computing, LLCVerified email at ieee.org
Ali MiliNJITVerified email at themilis.net
Ananth A. JillepalliWashington State UniversityVerified email at wsu.edu
Daniel Conte de LeonAssistant Professor of Computer Science, University of IdahoVerified email at uidaho.edu
krishna kaviUniversity of North TexasVerified email at cse.unt.edu
Michael HaneyAssistant Professor of Computer Science, University of IdahoVerified email at utulsa.edu
Mohammad AshrafuzzamanAssistant Professor of Cybersecurity at Ashland UniversityVerified email at ashland.edu
Thomas E. PotokComputational Data Analytics Group Leader, Oak Ridge National LaboratoryVerified email at ornl.gov
Anis Ben AissaNational Engineering School of Tunis, TunisiaVerified email at enit.utm.tn
Sajjan ShivaProfessor of Computer Science, University of MemphisVerified email at memphis.edu
Brian K. JohnsonProfessor of Electrical Engineering, University of IdahoVerified email at uidaho.edu
Saikat DasPh.D. in Computer Science, University of MemphisVerified email at memphis.edu
Predrag TosicEastern Washington University and Washington State UniversityVerified email at wsu.edu
Abdullah AbuhusseinAssistant Professor - St. Cloud State UniversityVerified email at stcloudstate.edu
Jim Alves-FossDirector, Center for Secure & Dependable Sys. and Professor of Computer Science, Univ. of IdahoVerified email at uidaho.edu
Stacy ProwellElectrical Engineering and Computer Science, The University of TennesseeVerified email at eecs.utk.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
W. David PanUniversity of Alabama in Huntsville (UAH)Verified email at uah.edu
Faisal S. AlsubaeiAssistant Professor at University of JeddahVerified email at uj.edu.sa
Hamed OkhraviSenior Researcher at MIT Lincoln LaboratoryVerified email at mit.edu