Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
Mohamed ShehabProfessor, University of North Carolina at CharlotteEmail verificata su uncc.edu
Muhammad Murtaza KhanNational University of Sciences and TechnologyEmail verificata su seecs.edu.pk
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentEmail verificata su kent.ac.uk
James NicholsonAssociate Professor, Northumbria UniversityEmail verificata su northumbria.ac.uk
Matt DixonNorthumbria UniversityEmail verificata su northumbria.ac.uk
Opeyemi Dele-Ajayi Ph.DResearch@MetaEmail verificata su meta.com
Toni PerkovićUniversity of Split, FESB unist.hrEmail verificata su fesb.hr
Heather Richter LipfordProfessor, University of North Carolina at CharlotteEmail verificata su uncc.edu
Hassan KhanUniversity of GuelphEmail verificata su uoguelph.ca
Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteEmail verificata su uncc.edu
Jocelyn ChanussotINRIA, on leave from Grenoble INPEmail verificata su grenoble-inp.fr
Mary Lou MaherUNC CharlotteEmail verificata su uncc.edu
Segui![Yousra Javed](https://usercontent.cljtscd.com/citations?view_op=view_photo&user=hoxGszUAAAAJ&citpid=24)
Yousra Javed
Associate Professor of Cybersecurity, Illinois State University
Email verificata su ilstu.edu - Home page