Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Hideya OchiaiThe University of TokyoVerified email at g.ecc.u-tokyo.ac.jp
- Doudou FALLAssociate Professor of Computer Science, Ecole Superieure Polytechnique, University Cheikh Anta DiopVerified email at esp.sn
- Yuzo TaenakaNara Institute of Science and TechnologyVerified email at is.naist.jp
- Latifur KhanProfessor, University of Texas at DallasVerified email at utdallas.edu
- Olufemi Abiodun AbrahamNara Institute of Science and TechnologyVerified email at is.naist.jp
- Sadaf MD HalimThe University of Texas at DallasVerified email at utdallas.edu
- Kevin W. HamlenLouis A. Beecherl, Jr. Distinguished Professor of Computer Science, The University of Texas atVerified email at utdallas.edu
- Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
- Xiaodi LiUniversity of Texas at DallasVerified email at utdallas.edu
- Hossen Asiful Mustafa, PhDBangladesh University of Engineering and Technology (BUET)Verified email at iict.buet.ac.bd
- Muhammad Abdullah AdnanUniversity of California San DiegoVerified email at ucsd.edu
- Nahid Ferdous AurnaPhD candidate, Nara Institute of Science and TechnologyVerified email at is.naist.jp
Follow
Dr. Md. Delwar Hossain
Asst. Professor in Cybersecurity at Nara Institute of Science and Technology (NAIST), Japan
Verified email at is.naist.jp