Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Syed Ishtiaque AhmedUniversity of TorontoVerified email at csebuet.org
Patrick TraynorUniversity of FloridaVerified email at cise.ufl.edu
Hadi AbdullahGraduate Research Assistant, University of FloridaVerified email at ufl.edu
Washington GarciaUniversity of FloridaVerified email at ufl.edu
Yuriy BrunManning College of Information and Computer Sciences, University of Massachusetts AmherstVerified email at cs.umass.edu
Justin CapposAssociate Professor of Computer Science and Engineering, NYUVerified email at nyu.edu
Tian LinUniversity of FloridaVerified email at ufl.edu
Donovan EllisGeorgia State UniversityVerified email at student.gsu.edu
Anjon BasakDEVCOM Army Research Laboratory (RAP)Verified email at miners.utep.edu
Pratyasha SahaUniversity of DhakaVerified email at ieee.org
S. M. Taiabul HaqueAssociate Professor, University of Central MissouriVerified email at ucmo.edu
Kat KrolGoogle UKVerified email at google.com
Simon ParkinAssistant Professor (Cybersecurity) - Technology, Policy & Management (TPM)Verified email at tudelft.nl
Eugene VassermanKansas State UniversityVerified email at ksu.edu
Emiliano De CristofaroProfessor at University College LondonVerified email at ucl.ac.uk
Logan BluePhD Student, University of FloirdaVerified email at ufl.edu
Follow