Get my own profile
Public access
View all71 articles
38 articles
available
not available
Based on funding mandates
Co-authors
Laurent NjillaUS. Air Force Research LaboratoryVerified email at us.af.mil
Sachin ShettyOld Dominion UniversityVerified email at odu.edu
Deepak K. ToshAssistant ProfessorVerified email at utep.edu
David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
Nandi LesliePrincipal Technical Fellow, Raytheon TechnologiesVerified email at rtx.com
Xueping Susan LiangFlorida International UniversityVerified email at fiu.edu
Ahmed H. Anwar, (Ahmed Hemida)Research Scientist, DEVCOM ARLVerified email at knights.ucf.edu
Christopher KiekintveldUniversity of Texas at El PasoVerified email at utep.edu
Muhammad SaadPayPalVerified email at knights.ucf.edu
Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
SHAMIK SENGUPTAExecutive Director, UNR Cybersecurity Center & Professor of Computer Science and Engineering Dept.Verified email at unr.edu
DaeHun NyangEwha Womans UniversityVerified email at ewha.ac.kr
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Danda B. RawatProfessor of ECE & CS, Howard UniversityVerified email at howard.edu
Mainak ChatterjeeApple Inc.Verified email at apple.com
Jeffrey SpauldingAdjunct Professor, Canisius CollegeVerified email at canisius.edu
Sundararaja Sitharama IyengarProfessor of Computer Science, Florida International UniversityVerified email at cis.fiu.edu
Jian TangProfessor, IEEE Fellow and ACM Distinguished Member, Department of EECS, Syracuse UniversityVerified email at syr.edu
Fei FangCarnegie Mellon UniversityVerified email at cmu.edu
Branislav BošanskıAssistant Professor, Dept. of Computer Science, FEE, Czech Technical University in PragueVerified email at agents.fel.cvut.cz
Follow
Charles Kamhoua
DEVCOM Army Research Laboratory, Network Security Branch
Verified email at army.mil