Get my own profile
Public access
View all19 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Robert AbercrombiePrime Time Computing, LLCVerified email at ieee.org
Ali MiliNJITVerified email at themilis.net
Ananth A. JillepalliWashington State UniversityVerified email at wsu.edu
Daniel Conte de LeonAssistant Professor of Computer Science, University of IdahoVerified email at uidaho.edu
Mohammad AshrafuzzamanAssistant ProfessorVerified email at uwplatt.edu
krishna kaviUniversity of North TexasVerified email at cse.unt.edu
Michael HaneyAssociate Professor of Cybersecurity and Computer Science, University of IdahoVerified email at utulsa.edu
Thomas E. PotokComputational Data Analytics Group Leader, Oak Ridge National LaboratoryVerified email at ornl.gov
Sajjan ShivaProfessor of Computer Science, University of MemphisVerified email at memphis.edu
Anis Ben AissaNational Engineering School of Tunis, TunisiaVerified email at enit.utm.tn
Saikat DasAssistant Professor, Utah Valley University. Ph.D. in Computer Science, University of MemphisVerified email at uvu.edu
Brian K. JohnsonProfessor of Electrical Engineering, University of IdahoVerified email at uidaho.edu
Predrag TosicEastern Washington University and Washington State UniversityVerified email at wsu.edu
Abdullah AbuhusseinAssociate Professor - St. Cloud State UniversityVerified email at stcloudstate.edu
khalid Albulayhiuniversity of IdahoVerified email at vandals.uidaho.edu
Jim Alves-FossDirector, Center for Secure & Dependable Sys. and Professor of Computer Science, Univ. of IdahoVerified email at uidaho.edu
Sultan AlmalkiPhD Candidate, University of IdahoVerified email at vandals.uidaho.edu
Faisal S. AlsubaeiAssistant Professor at University of JeddahVerified email at uj.edu.sa
Mohammed A. AleisaAssistant Professor at Majmaah UniversityVerified email at mu.edu.sa
W. David PanUniversity of Alabama in Huntsville (UAH)Verified email at uah.edu