Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Gedare BloomUniversity of Colorado Colorado SpringsVerified email at uccs.edu
- Habeeb OlufowobiAssistant Professor, University of Texas at ArlingtonVerified email at uta.edu
- Afia AnjumGraduate Research and Teaching Assistant, University of Texas at ArlingtonVerified email at uta.edu
- Paul AgbajeUniversity of Texas at ArlingtonVerified email at uta.edu
- Vijay BanerjeeUniversity of Colorado Colorado SpringsVerified email at uccs.edu
- Mitra NasriEindhoven University of Technology (TU/e)Verified email at tue.nl
- Uchenna EzeobiUniversity Of Colorado Colorado SpringsVerified email at uccs.edu
- Aishwarya VasuSouthern Illinois University CarbondaleVerified email at siu.edu
- Harini RamaprasadUniversity of North Carolina at CharlotteVerified email at uncc.edu
- Joshua SeatonUniversity of Colorado at Colorado SpringsVerified email at uccs.edu
- Philip N. BrownAssistant Professor of Computer Science at the University of Colorado, Colorado SpringsVerified email at uccs.edu
- Timothy WoodAssociate Professor, The George Washington UniversityVerified email at gwu.edu
- Monowar HasanAssistant Professor, School of EECS, Washington State UniversityVerified email at wsu.edu
- Kevin BowlynSacred Heart UniversityVerified email at sacredheart.edu
- Shouhuai XuGallogly Chair Professor in Cybersecurity, University of Colorado Colorado SpringsVerified email at uccs.edu
- Richi DubeyBITS Pilani, India.Verified email at alumni.bits-pilani.ac.in
- Catherine MeadowsGeorge Washington UniversityVerified email at gwu.edu