Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jinpeng WeiAssociate Professor, University of North Carolina at CharlotteVerified email at uncc.edu
Ehab Al-ShaerCarnegie Mellon UniversityVerified email at cmu.edu
Md Mazharul IslamPhD student of Software and Information Systems Depertment, University of North Carolina atVerified email at uncc.eduLatifur KhanProfessor, University of Texas at DallasVerified email at utdallas.edu
Basel AbdeenUniversity of Texas at DallasVerified email at utdallas.edu
Mir Mehedi A. PritomAssistant Professor of Computer Science, Tennessee Technological UniversityVerified email at tntech.edu
Tariqul IslamAssistant Professor of Cybersecurity, Information Systems, University of Maryland Baltimore CountyVerified email at umbc.edu
Tarannum Shaila ZamanUniversity of Maryland, Baltimore CountyVerified email at umbc.edu
Md Rabbi AlamUniversity of South FloridaVerified email at usf.edu
Ehsan AghaeiCisco Security | Carnegie Mellon UniversityVerified email at cisco.com
Sadegh FarhangPennsylvania State UniversityVerified email at psu.edu
Ashutosh DuttaApplied Scientist, AmazonVerified email at amazon.com
Qi DuanCarnegie Mellon UniversityVerified email at andrew.cmu.eduMosarrat JahanAssociate Professor, Department of Computer Science and Engineering, University of DhakaVerified email at cse.du.ac.bd
Follow
Md Sajidul Islam Sajid
Assistant Professor at Towson University
Verified email at towson.edu - Homepage