Get my own profile
Public access
View all6 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Ragib HasanFull Professor of Computer Science, University of Alabama at BirminghamVerified email at uab.edu
- Md Munirul HaqueButler UniversityVerified email at butler.edu
- Amit Kumar DuttaThe University of Alabama at BirminghamVerified email at cis.uab.edu
- Mahmud Hossain, Ph.D.Cybersecurity Researcher at Amazon Web ServicesVerified email at amazon.com
- Rasib Khan, Ph.D.Associate Professor, School of Computing and Analytics, Northern Kentucky UniversityVerified email at nku.edu
- Gary WarnerDirector of Research in Computer Forensics, University of Alabama at BirminghamVerified email at uab.edu
- Anthony SkjellumTennessee Technological UniversityVerified email at tntech.edu
- Nitesh SaxenaFull Professor at the Texas A&M UniversityVerified email at tamu.edu
- Marjan MernikProfessor of Computer Science, University of Maribor, SloveniaVerified email at um.si
- Shahid NoorAssistant Professor, Northern Kentucky UniversityVerified email at nku.edu