Get my own profile
Public access
View all67 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Kemal AkkayaProfessor of Computer Science, Florida International UniversityVerified email at fiu.edu
Hidayet AksuGoogleVerified email at google.com
Leonardo BabunSenior Cybersecurity Researcher at the Johns Hopkins University Applied Physics LaboratoryVerified email at fiu.edu
Abbas AcarFlorida International UniversityVerified email at fiu.edu
Amit Kumar SikderResearch ScientistVerified email at gatech.edu
Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringVerified email at ece.gatech.edu
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
Ahmet ArışSecurity Engineer at BeyondTrustVerified email at beyondtrust.com
John A. CopelandProfessor Emeritus, Ga. Tech, ECEVerified email at ece.gatech.edu
Z. Berkay CelikPurdue UniversityVerified email at purdue.edu
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
Enes ErdinUniversity of Central ArkansasVerified email at uca.edu
mumin cebeMarquette UniversityVerified email at marquette.edu
Nico SaputroParahyangan Catholic UniversityVerified email at unpar.ac.id
Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
Kyle DenneyFlorida International UniversityVerified email at fiu.edu
Luis Puche RondonPhD Student, Florida International UniversityVerified email at fiu.edu
AKM Iqtidar NewazGraduate Student, Florida International UniversityVerified email at fiu.edu
Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu
Abdullah AYDEGERComputer Science, Florida Institute of TechnologyVerified email at fit.edu