Get my own profile
Public access
View all21 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Robert AbercrombiePrime Time Computing, LLCVerified email at ieee.org
Ali MiliNJITVerified email at themilis.netAnanth A. JillepalliWashington State UniversityVerified email at ieee.org
Mohammad AshrafuzzamanAssistant ProfessorVerified email at uwplatt.edu
Saikat DasAssistant Professor, Utah Valley University. Ph.D. in Computer Science, University of MemphisVerified email at uvu.edu
Sajjan ShivaProfessor of Computer Science, University of MemphisVerified email at memphis.edu
krishna kaviUniversity of North TexasVerified email at cse.unt.edukhalid Albulayhiuniversity of IdahoVerified email at vandals.uidaho.edu
Mazen GazzanPh.D. Candidate, University of Idaho, USA || Lecturer, Najran University, SAVerified email at nu.edu.sa
Thomas E. PotokComputational Data Analytics Group Leader, Oak Ridge National LaboratoryVerified email at ornl.gov
Anis Ben AissaNational Engineering School of Tunis, TunisiaVerified email at enit.utm.tn
Brian K. JohnsonProfessor of Electrical Engineering, University of IdahoVerified email at uidaho.edu
Predrag TosicEastern Washington University and Washington State UniversityVerified email at wsu.edu
Dr.Sultan Ahmed AlmalkiNajran UniversityVerified email at nu.edu.sa
Abdullah AbuhusseinAssociate Professor - St. Cloud State UniversityVerified email at stcloudstate.edu
Jim Alves-FossDirector, Center for Secure & Dependable Sys. and Professor of Computer Science, Univ. of IdahoVerified email at uidaho.edu
Faisal S. AlsubaeiAssociate Professor at University of JeddahVerified email at uj.edu.sa
Mohammed A. AleisaAssistant Professor at Majmaah UniversityVerified email at mu.edu.sa
Qasem Abu Al-HaijaPhD in Computer Engineering| Dept. of Cybersecurity, Jordan University of Science and TechnologyVerified email at just.edu.jo
Ibukun OyewumiUniversity of IdahoVerified email at amazon.com