Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Byron J. WilliamsUniversity of FloridaVerified email at drbw.me
Alan DombkowskiWayne State UniversityVerified email at wayne.edu
Douglas CraigEmergency Medicine Research, University of MichiganVerified email at med.umich.edu
Zadia CodabuxUniversity of SaskatchewanVerified email at ieee.org
Hasan JamilProfessor of Computer Science, University of IdahoVerified email at uidaho.edu
Zalia ShamsMicrosoftVerified email at microsoft.com
Rajshakhar PaulResearch Fellow, Idaho State UniversityVerified email at isu.edu
TANMAY BHOWMIKMississippi State UniversityVerified email at msstate.edu
Kaushik Deb, PhDProfessor, Dept. of CSE, Chittagong University of Engineering & Technology (CUET)Verified email at cuet.ac.bd
Shahina FerdousSoftware Engineer, MicrosoftVerified email at microsoft.com
Md. Saidur RahmanProfessor, Dept. of Computer Science and Engineering, BUET, Dhaka-1000Verified email at cse.buet.ac.bd
Iqbal H Sarker, PhDCUET | Swinburne University | University of Technology Sydney | Cyber Security CRC | ECU, AustraliaVerified email at ecu.edu.au