Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Yousra JavedAssistant Professor of Cybersecurity, Illinois State UniversityVerified email at ilstu.edu
Said M. MaroufPh.D, iOS and Mac DeveloperVerified email at uncc.edu
Hakim TouatiData Scientist / Software engineer at OptymVerified email at uncc.edu
Fadi MohsenUniversity of GroningenVerified email at rug.nl
Salmin SultanaResearch Scientist, Intel LabsVerified email at intel.com
Abeer AlJarrahSan Francisco State UniversityVerified email at ieee.org
Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Gabriel GhinitaUniversity of Massachusetts BostonVerified email at umb.edu
Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteVerified email at uncc.edu
Smitha SundareswaranMeta, Microsoft, Google, Penn State UniversityVerified email at fb.com
Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Nazmus Sakib MiaziAssistant Teaching Professor, Northeastern UniversityVerified email at northeastern.edu
Andrew BesmerWinthrop UniversityVerified email at winthrop.edu
Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
Jinpeng WeiAssociate Professor, University of North Carolina at CharlotteVerified email at uncc.edu
Follow
Mohamed Shehab
Professor, University of North Carolina at Charlotte
Verified email at uncc.edu - Homepage