Get my own profile
Co-authors
Charles KamhouaUS Army Research Laboratory, Network Security BranchVerified email at mail.mil
Laurent NjillaUS. Air Force Research LaboratoryVerified email at us.af.mil
Xueping Susan LiangUniversity of North Carolina GreensboroVerified email at uncg.edu
Deepak K. ToshAssistant ProfessorVerified email at utep.edu
Danda B. RawatProfessor, Howard UniversityVerified email at howard.edu
Juan ZhaoResearch Assistant Professor of Vanderbilt University Medical CenterVerified email at vanderbilt.edu
Peter FoytikODU VMASCVerified email at odu.edu
Ying (Gina) TangRowan UniversityVerified email at rowan.edu
Hellen MazikuVerified email at my.tnstate.edu
Nghi H. TranUniversity of AkronVerified email at uakron.edu
Kamrul HasanPh.D. in Computational Modeling & Simulation Engineering, Old Dominion University.Verified email at odu.edu
CHUNSHENG XINOld Dominion UniversityVerified email at odu.edu
L.H. KeelTennessee State UniversityVerified email at tnstate.edu
Uttam GhoshVanderbilt UniversityVerified email at vanderbilt.edu
Taiwo OyedarePhD Student, Virginia TechVerified email at vt.edu
Pushpita ChatterjeeVerified email at res.srmuniv.ac.in
Robi PolikarProfessor of Electrical and Computer Engineering, Rowan University, Glassboro, NJ, USAVerified email at rowan.edu
Trung Q. DuongProfessor of Queen's Uni. Belfast, Research Chair - Royal Academy of EngineeringVerified email at qub.ac.uk
biswajit biswalAssistant Professor of Computer Science, South Carolina State UniversityVerified email at scsu.edu
David NicolWilliam and Mary, Dartmouth, University of IllinoisVerified email at illinois.edu
Sachin Shetty
Verified email at odu.edu - Homepage