Get my own profile
Public access
View all6 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ravi SandhuUniversity of Texas at San AntonioVerified email at utsa.edu
Yuan ChengGrand Valley State UniversityVerified email at gvsu.edu
Dang NguyenAmazon Web ServicesVerified email at my.utsa.edu
Xinwen ZhangHiretualVerified email at hiretual.com
Maanak GuptaAssociate Professor, Tennessee Tech UniversityVerified email at tntech.edu
Smriti BhattPurdue UniversityVerified email at purdue.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Gabriel GhinitaHamad Bin Khalifa UniversityVerified email at umb.edu
Murat KantarciogluProfessor of Computer Science, Virginia TechVerified email at vt.edu
Bhavani ThuraisinghamCyber Security Research and Education Institute, University of Texas at DallasVerified email at utdallas.edu
Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
Tahmina AhmedPhD, Department of Computer Science,University of Texas a San AntonioVerified email at my.utsa.edu
Khalid BijonSnowflakeVerified email at snowflake.com
Ram KrishnanUniversity of Texas at San AntonioVerified email at utsa.edu