Obtenir mon propre profil
Citée par
Toutes | Depuis 2019 | |
---|---|---|
Citations | 4899 | 4072 |
indice h | 37 | 31 |
indice i10 | 83 | 72 |
Accès public
Tout afficher38 articles
0 article
disponibles
non disponibles
Sur la base des exigences liées au financement
Coauteurs
- mo jamshidiThe University of Texas, San AntonioAdresse e-mail validée de utsa.edu
- Arun DasPostdoctoral Associate at University of Pittsburgh Medical Center (UPMC)Adresse e-mail validée de pitt.edu
- Sos AgaianDistinguished Professor ,Computer Sciences , CUNY Graduate Center &CSIAdresse e-mail validée de csi.cuny.edu
- Nicole BeebeProfessor, The University of Texas at San AntonioAdresse e-mail validée de utsa.edu
- H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioAdresse e-mail validée de buffalo.edu
- Yufei HuangUniversity of Pittsburg Medical CenterAdresse e-mail validée de pitt.edu
- John QuarlesProfessor of Computer Science, University of Texas at San AntonioAdresse e-mail validée de cs.utsa.edu
- Thi TranBinghamton University, SUNY, School of ManagementAdresse e-mail validée de binghamton.edu
- Kevin DesaiUniversity of Texas at San AntonioAdresse e-mail validée de utsa.edu
- Adel AlaeddiniAssociate Professor of Mechanical Engineering, University of Texas at San Antonio (UTSA)Adresse e-mail validée de utsa.edu
- Paul RuthRENCI - UNC Chapel HillAdresse e-mail validée de renci.org
- Anthony RiosAssistant Professor in Information Systems and Cyber SecurityAdresse e-mail validée de utsa.edu
- Gonzalo De La Torre ParraAssistant Professor in Cyber Security Systems, The University of the Incarnate Word