Get my own profile
Public access
View all7 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, GA, USAVerified email at kennesaw.edu
Saeid SafaeiPhD StudentVerified email at uga.edu
Mehdi Assefi, PhDUniversity of GeorgiaVerified email at uga.edu
Hamid R ArabniaProfessor Emeritus of Computer Science, University of GeorgiaVerified email at uga.edu
Viraaji MothukuriPhD Student, Kennesaw StateVerified email at students.kennesaw.edu
Juan B. GutiérrezProfessor, Chair of Mathematics, University of Texas at San AntonioVerified email at utsa.edu
Mohsen DorodchiUniversity of North Carolina at CharlotteVerified email at charlotte.edu
Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
Mohammad NasajpourGraduate Research Assistant at Kennesaw State UniversityVerified email at students.kennesaw.edu
Quan Z. (Michael) ShengDistinguished Professor, School of Computing, Macquarie University, Sydney, AustraliaVerified email at mq.edu.au
Meng HanIntelligence Fusion Research Center (IFRC)Verified email at zju.edu.cn
Liang ZhaoKennesaw State UniversityVerified email at kennesaw.edu
Giovanna SanninoSenior Researcher, ICAR - CNRVerified email at icar.cnr.it
Gong ChengProfessor, Nanjing UniversityVerified email at nju.edu.cn
NASRIN DEHBOZORGIKennesaw State UniversityVerified email at kennesaw.edu
Daniel Macêdo BatistaAssociate Professor, University of São PauloVerified email at ime.usp.br
Fatemeh Mosaiyebzadehgraduated computer scienceVerified email at ime.usp.br
Hossain ShahriarProfessor, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
Yixin (Chloe) XieKennesaw State UniversityVerified email at kennesaw.edu
MinJae WooClemson UniversityVerified email at clemson.edu