Get my own profile
Public access
View all38 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- mo jamshidiThe University of Texas, San AntonioVerified email at utsa.edu
- Arun DasPostdoctoral Associate at University of Pittsburgh Medical Center (UPMC)Verified email at pitt.edu
- Gonzalo De La Torre ParraAssistant Professor in Cyber Security Systems, The University of the Incarnate WordVerified email at uiwtx.edu
- Sos AgaianDistinguished Professor ,Computer Sciences , CUNY Graduate Center &CSIVerified email at csi.cuny.edu
- Nicole BeebeProfessor, The University of Texas at San AntonioVerified email at utsa.edu
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
- Yufei HuangUniversity of Pittsburg Medical CenterVerified email at pitt.edu
- John QuarlesProfessor of Computer Science, University of Texas at San AntonioVerified email at cs.utsa.edu
- Thi TranBinghamton University, SUNY, School of ManagementVerified email at binghamton.edu
- Kevin DesaiUniversity of Texas at San AntonioVerified email at utsa.edu
- Adel AlaeddiniAssociate Professor of Mechanical Engineering, University of Texas at San Antonio (UTSA)Verified email at utsa.edu
- Elias Bou-HarbLouisiana State UniversityVerified email at lsu.edu
- Paul RuthRENCI - UNC Chapel HillVerified email at renci.org
- Anthony RiosAssistant Professor in Information Systems and Cyber SecurityVerified email at utsa.edu