Get my own profile
Public access
View all1 article
2 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
Yousra JavedAssociate Professor of Cybersecurity, Illinois State UniversityVerified email at ilstu.edu
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Fadi MohsenUniversity of GroningenVerified email at rug.nl
Said M. MaroufPh.D, iOS and Mac DeveloperVerified email at uncc.edu
Abeer AlJarrahTrellixVerified email at ieee.org
Salmin SultanaCloud SW Architect, Intel LabsVerified email at intel.com
Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteVerified email at uncc.edu
Federica PaciDepartment of Computer Science, University of VeronaVerified email at univr.it
Gabriel GhinitaHamad Bin Khalifa UniversityVerified email at umb.edu
Nazmus Sakib MiaziAssistant Teaching Professor, Northeastern UniversityVerified email at northeastern.edu
Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
Smitha SundareswaranMeta, Microsoft, Google, Penn State UniversityVerified email at fb.com
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
Andrew BesmerWinthrop UniversityVerified email at winthrop.edu
Jinpeng WeiAssociate Professor, University of North Carolina at CharlotteVerified email at uncc.edu
Bojan CukicProfessor and Dean, College of Computing and Informatics, University of North Carolina at CharlotteVerified email at charlotte.edu
Follow
Mohamed Shehab
Professor, University of North Carolina at Charlotte
Verified email at uncc.edu - Homepage