Get my own profile
Public access
View all1 article
2 articles
available
not available
Based on funding mandates
Co-authors
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Anna C SquicciariniPennsylvania State UniversityVerified email at psu.edu
Gail-Joon AhnArizona State UniversityVerified email at asu.edu
Yousra JavedAssistant Professor of Cybersecurity, Illinois State UniversityVerified email at ilstu.edu
Said M. MaroufPh.D, iOS and Mac DeveloperVerified email at uncc.edu
Fadi MohsenUniversity of GroningenVerified email at rug.nl
Salmin SultanaResearch Scientist, Intel LabsVerified email at intel.com
Abeer AlJarrahSan Francisco State UniversityVerified email at ieee.org
Heather Richter LipfordProfessor, University of North Carolina at CharlotteVerified email at uncc.edu
Federica PaciDepartment of Informatics, University of VeronaVerified email at univr.it
Emmanuel Bello-OgunuDoctoral Student of Computing & Information Systems, UNC CharlotteVerified email at uncc.edu
Gabriel GhinitaUniversity of Massachusetts BostonVerified email at umb.edu
Smitha SundareswaranMeta, Microsoft, Google, Penn State UniversityVerified email at fb.com
Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
Nazmus Sakib MiaziAssistant Teaching Professor, Northeastern UniversityVerified email at northeastern.edu
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Mohammad Hossein ManshaeiIUT/EPFL/INRIAVerified email at epfl.ch
Andrew BesmerWinthrop UniversityVerified email at winthrop.edu
Jinpeng WeiAssociate Professor, University of North Carolina at CharlotteVerified email at uncc.edu
Bojan CukicProfessor and Dean, College of Computing and Informatics, University of North Carolina at CharlotteVerified email at uncc.edu
Follow
Mohamed Shehab
Professor, University of North Carolina at Charlotte
Verified email at uncc.edu - Homepage