-
Abdelwahab Hamou-Lhadj
empirical software engineering, complex software systems, software maintenance
-
J. William Atwood
autonomic networking, multicast, communication protocols
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Carol Fung
network management, cybersecurity, network security
-
Lingyu Wang
network security, privacy, security metrics
-
Essam Mansour
distributed/parallel systems, web data management, large-scale analytics on strings
-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
Suchit Ahuja
frugal innovation, digital strategy and innovation, social impacts of technology
-
Mohsen Ghafouri
cyberphysical security, power systems control, smart infrastructures
-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
-
Jamal Bentahar
software agents, multi-agent systems, formal logic
-
Raul Valverde
information systems reengineering, accounting information systems, e-supply chains
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Khashayar (Kash) Khorasani
control systems, cooperative control, nonlinear system control
-
Martin A. French
risk, surveillance, privacy
top associated keywords A-Z
- network security12
- privacy10
- artificial intelligence (AI)53
- cloud computing17
- distributed/parallel systems25
- information systems security12
- networks27
- software engineering26
- data mining21
- data security7
- formal methods6
- game theory16
- ICT29
- information technologies25
- wireless networks19
- aerospace69
- automated reasoning3
- big data30
- business processes6
- communication protocols8
- complex dynamic systems19
- complex software systems9
- control systems24
- cryptographic protocols6
- cryptography5
- cyberforensics5
- cyberphysical systems12
- data science38
- databases6
- detection of vulnerabilities3
- healthcare information systems4
- internet of things (IoT)17
- internet of things (IoT) security2
- internet studies23
- machine learning58
- mobile ad hoc networks11
- mobile platform security3
- model-driven software engineering7
- MPLS (multiprotocol label switching)2
- multicast2
- network resource allocation3
- power systems control4
- real-time systems5
- risk management24
- routing protocols7
- service-oriented computing7
- smart grids11
- smart infrastructures22
- social impacts of technology26
- software security6
- software-defined network security2