Get my own profile
Public access
View all5 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Tariqul IslamAssistant Professor of Cybersecurity, Information Systems, University of Maryland Baltimore CountyVerified email at umbc.edu
Maanak GuptaAssociate Chair and Associate Professor of Computer Science, Tennessee Tech UniversityVerified email at tntech.edu
Md Sajidul Islam SajidAssistant Professor at Towson UniversityVerified email at towson.edu
Guenevere (Qian) ChenAssociate Professor, Electrical and Computer Engineering, The University of Texas at San AntonioVerified email at utsa.edu
Nazmus Sakib MiaziAssistant Teaching Professor, Northeastern UniversityVerified email at northeastern.eduMohamed ShehabProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Sujan SarkerAssistant Professor, Department of Robotics and Mechatronics Engineering, University of DhakaVerified email at du.ac.bd
Dr. Md. Abdur RazzaqueProfessor of Computer Science and Engineering, University of Dhaka, BangladeshVerified email at du.ac.bd
M. Anwar HossainAssociate Professor, School of Computing, Queen's University, CanadaVerified email at queensu.ca
Prof. Dr. Mohammad Mehedi HassanProfessor, Dept. of Information Systems, King Saud University, Riyadh, KSAVerified email at ksu.edu.sa
Ehab Al-ShaerCarnegie Mellon UniversityVerified email at cmu.edu
Amirreza NiakanlahijiPrincipal Security Researcher, Microsoft CorporationVerified email at microsoft.com
Xi (Sunshine) NiuAssociate Professor, University of North Carolina at CharlotteVerified email at uncc.edu
Follow
Mir Mehedi A. Pritom
Assistant Professor of Computer Science, Tennessee Technological University
Verified email at tntech.edu - Homepage