Get my own profile
Public access
View all12 articles
1 article
available
not available
Based on funding mandates
Co-authors
Matthew WrightProfessor and Chair of Cybersecurity, Rochester Institute of TechnologyVerified email at rit.edu
Shannon Amerilda ScielzoUT SouthwesternVerified email at utsouthwestern.edu
Sovantharith SengRochester Institute of TechnologyVerified email at rit.edu
S. M. Taiabul HaqueAssociate Professor, BRAC UniversityVerified email at bracu.ac.bd
Kelly CaineProfessor, Clemson UniversityVerified email at clemson.edu
Susan E McGregorData Science Institute, Columbia UniversityVerified email at columbia.edu
Elizabeth Anne WatkinsResearch Scientist, Intel Labs Intelligent Systems Research (ISR)Verified email at intel.com
Franziska RoesnerProfessor, Paul G. Allen School of Computer Science & Engineering, Univ. of WashingtonVerified email at cs.washington.edu
Priyank ChandraUniversity of TorontoVerified email at utoronto.ca
Sharifa SultanaAssistant Professor, Computer Science, University of Illinois Urbana-ChampaignVerified email at illinois.edu
Apu KapadiaProfessor of Computer Science, Indiana University BloomingtonVerified email at indiana.edu
Ruj AkavipatKasetsart UniversityVerified email at ku.th
MD Romael HaqueVisiting Assistant Professor, Purdue University Fort WayneVerified email at purdue.edu
Shion GuhaUniversity of TorontoVerified email at utoronto.ca
Md Rakib HasanPhD Student, Louisiana State UniversityVerified email at cct.lsu.edu
Mehrab ShahriarMicrosoft, University of Texas at ArlingtonVerified email at mavs.uta.edu
Follow![Mahdi Nasrullah Al-Ameen](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=5Crt8x4AAAAJ&citpid=2)
Mahdi Nasrullah Al-Ameen
Associate Professor, Department of Computer Science, Utah State University
Verified email at usu.edu - Homepage