Get my own profile
Public access
View all81 articles
48 articles
available
not available
Based on funding mandates
Co-authors
- Laurent NjillaUS. Air Force Research LaboratoryVerified email at us.af.mil
- Sachin ShettyOld Dominion UniversityVerified email at odu.edu
- Deepak K. ToshAssistant ProfessorVerified email at utep.edu
- Ahmed H. Anwar, (Ahmed Hemida)Research Scientist, DEVCOM ARLVerified email at knights.ucf.edu
- Nandi LesliePrincipal Technical Fellow, RTXVerified email at rtx.com
- David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
- Xueping Susan LiangFlorida International UniversityVerified email at fiu.edu
- Christopher KiekintveldUniversity of Texas at El PasoVerified email at utep.edu
- Muhammad SaadX (formerly Twitter)Verified email at knights.ucf.edu
- SHAMIK SENGUPTAExecutive Director, UNR Cybersecurity Center & Professor of Computer Science and Engineering Dept.Verified email at unr.edu
- Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
- DaeHun NyangEwha Womans UniversityVerified email at ewha.ac.kr
- Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
- Danda B. RawatProfessor of ECE & CS, Howard UniversityVerified email at howard.edu
- Jeffrey SpauldingAdjunct Professor, Canisius CollegeVerified email at canisius.edu
- Zelin WanDepartment of Computer Science, Virginia TechVerified email at vt.edu
- Sundararaja Sitharama IyengarProfessor of Computer Science, Florida International UniversityVerified email at cis.fiu.edu
- Mainak ChatterjeeApple Inc.Verified email at apple.com
- Gabriel DeugoueProfessor of Mathematics, University of DschangVerified email at univ-dschang.org
- Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Follow
Charles Kamhoua
DEVCOM Army Research Laboratory, Adversarial Resilient Cyber Methodology Team Leader
Verified email at army.mil