Get my own profile
Public access
View all77 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Kemal AkkayaProfessor of Computer Science, Florida International UniversityVerified email at fiu.edu
Hidayet AksuGoogleVerified email at google.com
Leonardo BabunSenior Cybersecurity Researcher at the Johns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
Abbas AcarFlorida International UniversityVerified email at fiu.edu
Amit Kumar SikderResearch Scientist IVerified email at gatech.edu
Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringVerified email at ece.gatech.edu
Ahmet ArıºSecurity Engineer at BeyondTrustVerified email at beyondtrust.com
Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
John A. CopelandProfessor Emeritus, Ga. Tech, ECEVerified email at ece.gatech.edu
Z. Berkay CelikAssistant Professor of Computer Science, Purdue UniversityVerified email at purdue.edu
Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
Enes ErdinUniversity of Central ArkansasVerified email at uca.edu
mumin cebeVerified email at marquette.edu
Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
Nico SaputroParahyangan Catholic UniversityVerified email at unpar.ac.id
Kyle DenneyFlorida International UniversityVerified email at fiu.edu
Luis Puche RondonPhD Student, Florida International UniversityVerified email at fiu.edu
AKM Iqtidar NewazLecturer, North South UniversityVerified email at northsouth.edu
Harun OzGraduate Research Assistant, Florida International UniversityVerified email at fiu.edu
Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu