-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Dongyu Qiu
networks, network performance evaluation, wireless networks
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
top associated keywords A-Z
- ICT29
- botnet defence4
- cryptographic protocols6
- cryptography5
- cybersecurity16
- distributed/parallel systems25
- information systems security12
- mobile ad hoc networks11
- Boolean functions1
- CDMA20001
- cloud computing17
- cloud networks2
- cognitive radio networks4
- communication protocols8
- complex dynamic systems19
- control systems theory6
- cross-layer design2
- cryptographic algorithms1
- cyberforensics5
- cyberphysical systems12
- data hiding/embedding1
- data security7
- distributed deployment algorithms4
- dynamic scheduling4
- FH-CDMA sequence design1
- game theory16
- information technologies25
- MPLS (multiprotocol label switching)2
- multicast2
- network congestion control1
- network optimization4
- network performance evaluation4
- network resource allocation3
- nonlinear system control5
- peer-to-peer networks1
- queueing networks1
- queueing theory2
- real-time systems5
- routing algorithms2
- routing protocols7
- side channel attacks1
- software engineering26
- software quality and best practices11
- software security6
- speech recognition technology5
- stochastic analysis13
- TCP/IP networks1
- text to speech synthesizers3
- usable security3
- VOIP1
- web applications2