Get my own profile
Public access
View all16 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nicholas HopperProfessor of Computer Science & Engineering, University of MinnesotaVerified email at umn.edu
Shelia Kennison, ProfessorDepartment of Psychology, Oklahoma State UniversityVerified email at okstate.edu
Yongdae KimProfessor of Electrical Engineering, KAIST, KoreaVerified email at kaist.ac.kr
Mohammed AbuhamadLoyola University ChicagoVerified email at luc.edu
Yanmin GongUniversity of Texas at San AntonioVerified email at utsa.edu
Tamer ABUHMEDAssociate Professor, College of Computing and Informatics, Sungkyunkwan UniversityVerified email at skku.edu
Denis Foo KuneAmazon Web ServicesVerified email at amazon.com
Peng WangQualcommVerified email at qti.qualcomm.com
Eugene VassermanKansas State UniversityVerified email at ksu.edu
Praveen khethavathLaGuardia Community CollegeVerified email at lagcc.cuny.edu
Yuanxiong GuoUniversity of Texas at San AntonioVerified email at utsa.edu
Loretta StalansLoyola University ChicagoVerified email at luc.edu
Victor HeorhiadiAWSVerified email at victorh.net
Jinoh KimAssociate Professor, Texas A&M University-CommerceVerified email at tamuc.edu
Follow![Eric Chan-Tin](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=Eleytz0AAAAJ&citpid=1)
Eric Chan-Tin
Associate Professor of Cybersecurity, Loyola University Chicago
Verified email at cs.luc.edu - Homepage