-
Suryadipta Majumdar
cybersecurity, information systems security, data security
-
J. William Atwood
autonomic networking, multicast, communication protocols
-
Ivan Pustogarov
information systems security, cryptographic protocols, privacy
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
-
Carol Fung
network management, cybersecurity, network security
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Lingyu Wang
network security, privacy, security metrics
-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
top associated keywords A-Z
- information systems security12
- networks27
- privacy10
- data security7
- distributed/parallel systems25
- formal methods6
- ICT29
- wireless networks19
- artificial intelligence (AI)53
- cloud computing17
- communication protocols8
- cryptographic protocols6
- cryptography5
- cyberforensics5
- detection of vulnerabilities3
- game theory16
- internet of things (IoT) security2
- mobile ad hoc networks11
- mobile platform security3
- MPLS (multiprotocol label switching)2
- multicast2
- network resource allocation3
- routing protocols7
- software engineering26
- software-defined network security2
- 3D digital imaging15
- aerospace69
- anonymity modeling1
- anti-surveillance tools2
- attack graphs1
- auditing virtual network isolation1
- automated reasoning3
- autonomic networking2
- blockchain2
- botnet defence4
- CDMA20001
- cloud networks2
- cloud security auditing1
- coding theory1
- cognitive radio networks4
- collaborative intrusion detection1
- complex dynamic systems19
- computer graphics13
- cross-layer design2
- cryptocurrency4
- cyberphysical systems12
- data mining21
- DDoS defense1
- deanonymization1
- embedded systems8
- FinTech3