Get my own profile
Public access
View all77 articles
8 articles
available
not available
Based on funding mandates
Co-authors
- Kemal AkkayaProfessor of Computer Science, Florida International UniversityVerified email at fiu.edu
- Hidayet AksuGoogleVerified email at google.com
- Leonardo BabunSenior Cybersecurity Researcher at the Johns Hopkins University Applied Physics LaboratoryVerified email at jhuapl.edu
- Abbas AcarFlorida International UniversityVerified email at fiu.edu
- Amit Kumar SikderAssistant Professor, Iowa State UniversityVerified email at iastate.edu
- Raheem BeyahDean and Southern Company Chair, Georgia Tech College of EngineeringVerified email at ece.gatech.edu
- Ahmet ArıºSecurity Engineer at BeyondTrustVerified email at beyondtrust.com
- Mauro ContiIEEE Fellow - Prof. @ University of Padua - Affiliate Prof. @ TU Delft/UW SeattleVerified email at math.unipd.it
- John A. CopelandProfessor Emeritus, Ga. Tech, ECEVerified email at ece.gatech.edu
- Z. Berkay CelikAssistant Professor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Patrick McDanielTsun-Ming Shih Professor of Computer Sciences, University of Wisconsin-MadisonVerified email at cs.wisc.edu
- Enes ErdinUniversity of Central ArkansasVerified email at uca.edu
- Mohammad Ashiqur RahmanFlorida International UniversityVerified email at fiu.edu
- Nico SaputroParahyangan Catholic UniversityVerified email at unpar.ac.id
- Kyle DenneyFlorida International UniversityVerified email at fiu.edu
- Harun OzResearch Scientist, MetaVerified email at meta.com
- Luis Puche RondonPhD Student, Florida International UniversityVerified email at fiu.edu
- AKM Iqtidar NewazLecturer, North South UniversityVerified email at northsouth.edu
- Ismail GuvencNorth Carolina State UniversityVerified email at ncsu.edu
- Engin KirdaNortheastern University and Lastline Inc. (co-founder)Verified email at ccs.neu.edu