Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Gedare BloomUniversity of Colorado Colorado SpringsVerified email at uccs.edu
Habeeb OlufowobiAssistant Professor, University of Texas at ArlingtonVerified email at uta.edu
Afia AnjumGraduate Research and Teaching Assistant, University of Texas at ArlingtonVerified email at uta.edu
Paul AgbajeUniversity of Texas at ArlingtonVerified email at uta.edu
Vijay BanerjeeUniversity of Colorado Colorado SpringsVerified email at uccs.edu
Mitra NasriEindhoven University of Technology (TU/e)Verified email at tue.nl
Uchenna EzeobiUniversity Of Colorado Colorado SpringsVerified email at uccs.edu
Aishwarya VasuSouthern Illinois University CarbondaleVerified email at siu.edu
Harini RamaprasadUniversity of North Carolina at CharlotteVerified email at uncc.edu
Timothy WoodAssociate Professor, The George Washington UniversityVerified email at gwu.edu
Monowar HasanAssistant Professor, School of EECS, Washington State UniversityVerified email at wsu.edu
Joshua SeatonUniversity of Colorado at Colorado SpringsVerified email at uccs.edu
Philip N. BrownAssistant Professor of Computer Science at the University of Colorado, Colorado SpringsVerified email at uccs.edu
Kevin BowlynSacred Heart UniversityVerified email at sacredheart.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Richi DubeyBITS Pilani, India.Verified email at alumni.bits-pilani.ac.in