Get my own profile
Public access
View all14 articles
4 articles
available
not available
Based on funding mandates
Co-authors
David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
Afsah AnwarUniversity of New MexicoVerified email at unm.edu
Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Verified email at gre.ac.uk
DaeHun NyangEwha Womans UniversityVerified email at ewha.ac.kr
Jeman ParkKyungHee UniversityVerified email at khu.ac.kr
Ahmed AbusnainaML Research Scientist, MetaVerified email at fb.com
Aminollah Khormali, Ph.D.University of North Carolina at Chapel HillVerified email at unc.edu
Jinchun ChoiElectronics and Telecommunications Research Institute (ETRI)Verified email at etri.re.kr
Mohammed AbuhamadLoyola University ChicagoVerified email at luc.edu
Muhammad SaadX (formerly Twitter)Verified email at knights.ucf.edu
Rhongho JangWayne State UniversityVerified email at wayne.edu
Jeffrey SpauldingAdjunct Professor, Canisius CollegeVerified email at canisius.edu
Ülkü Meteriz YıldıranMeta, University of Central FloridaVerified email at meta.com
Ashar AhmadRapticoreVerified email at rapticore.com