Get my own profile
Public access
View all39 articles
0 articles
available
not available
Based on funding mandates
Co-authors
mo jamshidiThe University of Texas, San AntonioVerified email at utsa.edu
Arun DasPostdoctoral Associate at University of Pittsburgh Medical Center (UPMC)Verified email at pitt.edu
Gonzalo De La Torre ParraAssistant Professor in Cyber Security Systems, The University of the Incarnate WordVerified email at uiwtx.edu
Nicole BeebeProfessor, The University of Texas at San AntonioVerified email at utsa.edu
H.R. RaoDepartment of Information Systems and Cyber Security, University of Texas at San AntonioVerified email at buffalo.edu
Sos AgaianDistinguished Professor ,Computer Sciences , CUNY Graduate Center &CSIVerified email at csi.cuny.edu
Yufei HuangUniversity of Pittsburg Medical CenterVerified email at pitt.edu
John QuarlesProfessor of Computer Science, University of Texas at San AntonioVerified email at cs.utsa.edu
Thi TranBinghamton University, SUNY, School of ManagementVerified email at binghamton.edu
Elias Bou-HarbLouisiana State UniversityVerified email at lsu.edu
Kevin DesaiUniversity of Texas at San AntonioVerified email at utsa.edu
Adel AlaeddiniAssociate Professor of Mechanical Engineering, University of Texas at San Antonio (UTSA)Verified email at utsa.edu
Anthony RiosAssistant Professor in Information Systems and Cyber SecurityVerified email at utsa.edu
Paul RuthRENCI - UNC Chapel HillVerified email at renci.org