Get my own profile
Public access
View all11 articles
4 articles
available
not available
Based on funding mandates
Co-authors
David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
Afsah AnwarUniversity of New MexicoVerified email at unm.edu
DaeHun NyangEwha Womans UniversityVerified email at ewha.ac.kr
Jeman ParkKyungHee UniversityVerified email at khu.ac.kr
Muhammad WaqasCentre for Sustainable Cyber Security (CS2)Verified email at gre.ac.uk
Ahmed AbusnainaML Research Scientist, MetaVerified email at fb.com
Aminollah Khormali, Ph.D.University of Central Florida (UCF)Verified email at ucf.edu
Jinchun ChoiElectronics and Telecommunications Research Institute (ETRI)Verified email at etri.re.kr
Mohammed AbuhamadLoyola University ChicagoVerified email at luc.edu
Muhammad SaadX (formerly Twitter)Verified email at knights.ucf.edu
Rhongho JangWayne State UniversityVerified email at wayne.edu
Jeffrey SpauldingAdjunct Professor, Canisius CollegeVerified email at canisius.edu
Ülkü Meteriz YıldıranMeta, University of Central FloridaVerified email at meta.com
Ashar AhmadRapticoreVerified email at rapticore.com