Get my own profile
Public access
View all5 articles
7 articles
available
not available
Based on funding mandates
Co-authors
Ali A. GhorbaniProfessor and Canada Research Chair in CybersecurityVerified email at unb.ca
Mahbod TavallaeeIBMVerified email at ibm.com
Issa TraoreProfessor, ECE Department, University of VictoriaVerified email at ece.uvic.ca
Ebrahim BagheriUniversity of TorontoVerified email at utoronto.ca
Sherif SaadSchool of Computer Science, University of Windsor, CanadaVerified email at uwindsor.ca
Dan GarantMassMutualVerified email at massmutual.com
Goaletsa RammidiUniversity of BotswanaVerified email at ub.ac.bw
Aaron GulliverDepartment of Electrical and Computer Engineering, University of VictoriaVerified email at ece.uvic.ca
Qixun Zhang北京邮电大学教授Verified email at bupt.edu.cn
Qiaoyan YuUniversity of New Hampshire; University of RochesterVerified email at unh.edu
Sara RosenbaumVerified email at uri.edu
NISHANTH GOUD CHENNAGOUNIstudent, University of New hampshireVerified email at unh.edu
Mohammad Mezanur Rahman MonjurGraduate Researcher at University of New HampshireVerified email at wildcats.unh.edu
Marcelo Luiz BrocardoProfessorVerified email at uvic.ca
Follow
Wei Lu
Professor and Chair of Computer Science, Keene State College/USNH
Verified email at keene.edu - Homepage