Get my own profile
Public access
View all7 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Hossain ShahriarProfessor, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
Md Jobair Hossain FarukNew York Institute of TechnologyVerified email at nyit.edu
Nazmus SakibAssistant Professor of Information TechnologyVerified email at kennesaw.edu
Sharaban TahoraGraduate Research AssistantVerified email at students.kennesaw.edu
Maria ValeroAssistant Professor, Kennesaw State UniversityVerified email at kennesaw.edu
Abdul BarekGraduate Research Assistant, University of West FloridaVerified email at students.uwf.edu
Mia, Md RaihanPhD Candidate at Marquette UniversityVerified email at marquette.edu
Sheikh Iqbal AhamedMarquette University, USAVerified email at marquette.edu
Sweta SnehaProfessor of Information SystemsVerified email at kennesaw.edu
ABM Kamrul Islam RiadPhD Student, Graduate Research Assistant, Sr. System Engineer, Infosys LtdVerified email at students.uwf.edu
MD Saiful IslamStudent of MSIT, Graduate Research Assistant, Kennesaw State UniversityVerified email at students.kennesaw.edu
Liang ZhaoKennesaw State UniversityVerified email at kennesaw.edu
Akond RahmanAuburn UniversityVerified email at auburn.edu
Mazharul IslamSoftware EngineerVerified email at siswa.upsi.edu.my
Nafisa AnjumLecturer of Information Technology, Kennesaw State UniversityVerified email at students.kennesaw.edu
Aiasha SiddikaLecturer of Information Technology, Georgia Gwinnett CollegeVerified email at ggc.edu
Md. Mehedi HasanThe University of Sydney, Australia.Verified email at uni.sydney.edu.au
Fahim Islam AnikKhulna University of Engineering & TechnologyVerified email at me.kuet.ac.bd
Md Mehedi HasanGraduate Research Assistant & Master's Student at Kennesaw State UniversityVerified email at students.kennesaw.edu
Daniele FontanelliProfessor, University of TrentoVerified email at unitn.it