Get my own profile
Public access
View all9 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Mohammad ZulkernineProfessor, School of Computing, Queen's UniversityVerified email at cs.queensu.ca
- Nur Zincir-HeywoodProfessor of Computer Science, Dalhousie UniversityVerified email at cs.dal.ca
- Steven H. H. DingData Mining and Security Lab, McGill UniversityVerified email at mail.mcgill.ca
- Karim LounisAssistant Professor at ENSIA, The National School of Artificial Intelligence, Algeria.Verified email at ensia.edu.dz
- Patrick MartinSchool of Computing, Queen's UniversityVerified email at cs.queensu.ca
- Khalid ElgazzarOntario Tech UniversityVerified email at ontariotechu.ca
- Lama MoukahalPhD in Cybersecurity, Senior Cybersecurity ResearcherVerified email at queensu.ca
- Farhana ZulkernineAssociate Professor, School of Computing, Queen's UniversityVerified email at queensu.ca
- Haruna IsahResearch Associate, Canadian Institute for Cybersecurity, University of New BrunswickVerified email at unb.ca
- Sidney GivigiAssociate Professor, Queen's UniversityVerified email at queensu.ca
Follow