Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jon MuzioProfessor of Computer Science, University of VictoriaVerified email at cs.uvic.ca
- Kenneth B KentUniversity of New BrunswickVerified email at unb.ca
- Mitchell A ThorntonSouthern Methodist University, Darwin Deason Institute for Cyber SecurityVerified email at ieee.org
- Mozammel H A KhanProfessor, Computer Science and Engineering, East West University, Dhaka, BangladeshVerified email at ewubd.edu
- Zamilur Rahman, PhDAssistant Professor, School of Computer Science and Technology, Algoma UniversityVerified email at algomau.ca
- Micaela SerraProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
- Francois TaianiProfessor - Univ Rennes, Inria, CNRS, IRISAVerified email at computer.org
- Professor Paul RaysonSchool of Computing and Communications, Lancaster University, UKVerified email at lancaster.ac.uk
- Wendy OsbornAssociate Professor, University of LethbridgeVerified email at uleth.ca
- Barry GergelDepartment of Computing Science, University of AlbertaVerified email at ualberta.ca
- Gongbing ShanProfessor of Biomechanics, University of Lethbridge, CanadaVerified email at uleth.ca
- Bradley EllertVerified email at uleth.ca