Get my own profile
Public access
View all89 articles
54 articles
available
not available
Based on funding mandates
Co-authors
Sachin ShettyOld Dominion UniversityVerified email at odu.edu
Deepak K. ToshAssociate ProfessorVerified email at utep.edu
Ahmed H. Anwar, (Ahmed Hemida)Research Scientist, DEVCOM ARLVerified email at knights.ucf.edu
Nandi LesliePrincipal Technical Fellow, RTXVerified email at rtx.com
David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
Christopher KiekintveldUniversity of Texas at El PasoVerified email at utep.edu
Xueping Susan LiangFlorida International UniversityVerified email at fiu.edu
Muhammad SaadX (formerly Twitter)Verified email at knights.ucf.edu
SHAMIK SENGUPTAExecutive Director, UNR Cybersecurity Center & Professor of Computer Science and Engineering Dept.Verified email at unr.edu
Joon S. ParkSchool of Information Studies (iSchool), Syracuse UniversityVerified email at syr.edu
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
DaeHun NyangEwha Womans UniversityVerified email at ewha.ac.kr
Danda B. RawatProfessor of ECE & CS, Howard UniversityVerified email at howard.edu
Zelin WanDepartment of Computer Science, Virginia TechVerified email at vt.edu
Jeffrey SpauldingAdjunct Professor, Canisius CollegeVerified email at canisius.edu
Gabriel DeugoueProfessor of Mathematics, University of DschangVerified email at univ-dschang.org
Sundararaja Sitharama IyengarProfessor of Computer Science, Florida International UniversityVerified email at cis.fiu.edu
Mainak ChatterjeeApple Inc.Verified email at apple.com
Fei FangCarnegie Mellon UniversityVerified email at cmu.edu
Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
Follow
Charles Kamhoua
IEEE Fellow, Team Leader, DEVCOM Army Research Laboratory
Verified email at army.mil