Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Tariqul IslamAssistant Professor of Cybersecurity, Information Systems, University of Maryland Baltimore CountyVerified email at umbc.edu
Faisal Haque BappyUniversity of Maryland Baltimore CountyVerified email at umbc.edu
Tingting YuAssociate Professor, University of ConnecticutVerified email at uconn.edu
Md Sajidul Islam SajidAssistant Professor at Towson UniversityVerified email at towson.edu
Mir Mehedi A. PritomAssistant Professor of Computer Science, Tennessee Technological UniversityVerified email at tntech.edu
Raiful HasanAssistant Professor, Kent State UniversityVerified email at kent.edu
Tahrim HossainUniversity Of Maryland, Baltimore CountyVerified email at umbc.edu
Chao WangUniversity of Southern CaliforniaVerified email at usc.edu
xue hanUniversity of Southern IndianaVerified email at usi.edu
Hemanth Kishan MacharlaMaster's in Computers and Information Sciences, State University of New YorkVerified email at sunypoly.edu
Jane Huffman HayesUniversity of KentuckyVerified email at cs.uky.edu
Yu ZhaoAssistant Professor of Computer Science, University of CincinnatiVerified email at UC.EDU
Md. Fahim ArefinLecturer, CSE, University of DhakaVerified email at cse.du.ac.bd
Md Sifat HossainUniversity of DhakaVerified email at student.cse.du.ac.bd
Lutfun Nahar LotaAssistant Professor, CSE, Islamic University of TechnologyVerified email at iut-dhaka.edu
Mia Mohammad ImranMissouri University of Science and TechnologyVerified email at mst.edu
Chadni IslamLecturer, Edith Cowan University (ECU)Verified email at ecu.edu.au
Hisham A. KholidyNorthern Illinois UniversityVerified email at sunypoly.edu
Rupasree DeyPhD Student @Colorado State UniversityVerified email at colostate.edu
Mirza Kamrul Bashar ShuhanGeorge Mason UniversityVerified email at gmu.edu