Get my own profile
Public access
View all21 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Robert AbercrombiePrime Time Computing, LLCVerified email at ieee.org
- Ali MiliNJITVerified email at themilis.net
- Ananth A. Jillepalli-Verified email at ieee.org
- Mohammad AshrafuzzamanAssistant ProfessorVerified email at uwplatt.edu
- Sajjan ShivaProfessor of Computer Science, University of MemphisVerified email at memphis.edu
- Saikat DasAssistant Professor, Utah Valley University. Ph.D. in Computer Science, University of MemphisVerified email at uvu.edu
- krishna kaviUniversity of North TexasVerified email at cse.unt.edu
- Thomas E. PotokComputational Data Analytics Group Leader, Oak Ridge National LaboratoryVerified email at ornl.gov
- khalid Albulayhiuniversity of IdahoVerified email at vandals.uidaho.edu
- Anis Ben AissaNational Engineering School of Tunis, TunisiaVerified email at enit.utm.tn
- Brian K. JohnsonProfessor of Electrical Engineering, University of IdahoVerified email at uidaho.edu
- Predrag TosicEastern Washington University and Washington State UniversityVerified email at wsu.edu
- Abdullah AbuhusseinAssociate Professor - St. Cloud State UniversityVerified email at stcloudstate.edu
- Mazen GazzanPh.D. Candidate, University of Idaho, USA || Lecturer, Najran University, SAVerified email at nu.edu.sa
- Dr.Sultan Ahmed AlmalkiNajran UniversityVerified email at nu.edu.sa
- Jim Alves-FossDirector, Center for Secure & Dependable Sys. and Professor of Computer Science, Univ. of IdahoVerified email at uidaho.edu
- Faisal S. AlsubaeiAssociate Professor at University of JeddahVerified email at uj.edu.sa
- Mohammed A. AleisaAssistant Professor at Majmaah UniversityVerified email at mu.edu.sa
- Ibukun OyewumiUniversity of IdahoVerified email at amazon.com
- Qasem Abu Al-HaijaPhD in Computer Engineering| Dept. of Cybersecurity, Jordan University of Science and TechnologyVerified email at just.edu.jo