Get my own profile
Public access
View all39 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Laurie WilliamsNorth Carolina State University Distinguished University Professor, IEEE Fellow, ACM FellowVerified email at csc.ncsu.edu
Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
Chris ParninMicrosoftVerified email at microsoft.com
Farzana Ahamed BhuiyanGraduate Assistant, Tennessee Tech UniversityVerified email at students.tntech.edu
DIBYENDU BRINTO BOSEGraduate StudentVerified email at vt.edu
Rahul KrishnaResearch Staff Member :: IBM Research, Yorktown Heights, NYVerified email at ibm.com
Nasif ImtiazNorth Carolina State UniversityVerified email at ncsu.edu
Tim MenziesNorth Carolina State University, Computer Science, IEEE Fellow, ASE FellowVerified email at ncsu.edu
Mahmuda NazninProfessor of Computer Science and Engineering, Bangladesh University of Engineering and TechnologyVerified email at cse.buet.ac.bd
Atiqul MollahCornelis NetworksVerified email at cornelisnetworks.com