Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Hossain ShahriarAssociate Director, Center for Cybersecurity, University of West FloridaVerified email at uwf.edu
- Md Jobair Hossain FarukKennesaw State UniversityVerified email at students.kennesaw.edu
- Michael E. WhitmanProfessor of Information Security and Assurance, Kennesaw State UniversityVerified email at kennesaw.edu
- Alfredo CuzzocreaDistinguished Professor of Computer Engineering, University of Calabria, ItalyVerified email at si.dimes.unical.it
- Maria ValeroAssistant Professor, Kennesaw State UniversityVerified email at kennesaw.edu
- Md Abdullah Al Hafiz KhanAssistant Professor, Department of Compute Science, Kennesaw State UniversityVerified email at kennesaw.edu
- Muhammad Nazrul IslamMilitary Institute of Science and TechnologyVerified email at cse.mist.ac.bd
- Sanzida Mojib LunaPhD Student, Niantic X RIT Geo Games and Media Research LabVerified email at g.rit.edu
- ABM Kamrul Islam RiadPhD Student, Graduate Research Assistant, Sr. System Engineer, Infosys LtdVerified email at students.uwf.edu
- Rahul PanditaStaff Researcher, Github Inc.Verified email at github.com
Follow
Farhat Lamia Barsha
Graduate Research Assistant, Tennessee Technological University
Verified email at tntech.edu - Homepage