Get my own profile
Public access
View all12 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Ahmad Y. JavaidAssociate Professor, The University of ToledoVerified email at utoledo.edu
- Weiqing SunProfessor, University of ToledoVerified email at utoledo.edu
- Xiaoli YangFairfield UniversityVerified email at fairfield.edu
- Sidike PahedingAssistant Professor of Computer Science, Fairfield UniversityVerified email at fairfield.edu
- Farha JahanAssistant Professor, Ohio Northern UniversityVerified email at rockets.utoledo.edu
- Akshay MathurFairfield UniversityVerified email at fairfield.edu
- Abel Andres Reyes AnguloMichigan Technological UniversityVerified email at mtu.edu
- Yuchen LiResearch Assistant of Electrical and Computer Engineering, Purdue University NorthwestVerified email at pnw.edu
- Jeevan S DevagiriStudent at Michigan TechVerified email at mtu.edu
- Samantha L. SmithMichigan Technological UniversityVerified email at mtu.edu
- Safia RahmatCyber Security Data Analytics ExpertVerified email at utoledo.edu
- Keyur KulkarniUniversity of ToledoVerified email at utoledo.edu
- Ahmad Maroof KarimiOak Ridge National LaboratoryVerified email at case.edu
- Colin ElkinXylem Inc.Verified email at xylem.com
- A. J. Sravan KumarStudent at Koneru Lakshmaiah Education FoundationVerified email at kluniversity.in
- Dr. P. C. Srinivasa RaoAssoc. Prof, K L Hyd, Former Researcher, Purdue University NW, USA, Ph.D. (IIT), PDF (IIIT)Verified email at klh.edu.in
- Aaditeshwar SethComputer Science, IIT DelhiVerified email at cse.iitd.ernet.in
- Medha PujariUniversity of ToledoVerified email at rockets.utoledo.edu
- Asmer Hamid AliPhD Student, Johns Hopkins UniversityVerified email at jh.edu
- Rayed Suhail AhmadGraduate Research Assistant, Purdue University NorthwestVerified email at pnw.edu