Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Ali DehghantanhaCanada Research Chair in Cybersecurity & Threat Intelligence, Cyber Science Lab,University of GuelphVerified email at uoguelph.ca
- Sattar HashemiProfessor of Artificial Intelligence, Shiraz UniversityVerified email at shirazu.ac.ir
- Marzieh AhmadzadehYork UniversityVerified email at yorku.ca
- Raouf KhayamiShiraz University of TechnologyVerified email at sutech.ac.ir
- Reza M. PariziDecentralized Science Lab (dSL), Kennesaw State University, GA, USAVerified email at kennesaw.edu
- Hamid DarabianShiraz UniversityVerified email at cse.shirazu.ac.ir
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Ahmad JaliliAssistant Professor of Computer Networks, Department of Computer Engineering and InformationVerified email at gonbad.ac.ir
- Manijeh KeshtgaryDept. of Computer Eng. & IT, Shiraz University of TechnologyVerified email at alumni.colostate.edu
- Yousef EmamiFEUP, University of PortoVerified email at fe.up.pt
- Mohammad Reza Salehishiraz university of technoogyVerified email at sutech.ac.ir
- Ebrahim Torki ZadehK.N Toosi University of technologyVerified email at niopdc.ir
Follow
Sajad Homayoun
Postdoc Researcher, Denmark Technical University (DTU)
Verified email at dtu.dk - Homepage