-
Serguei A. Mokhov
Forensic Lucid, formal methods, software engineering
-
Lingyu Wang
network security, privacy, security metrics
-
Dongyu Qiu
networks, network performance evaluation, wireless networks
-
Amr Youssef
cryptography, cyberphysical systems, cryptographic algorithms
-
Ayda Basyouni
software quality and best practices, information systems security, networks
-
Anjali Agarwal
cloud networks, wireless networks, cognitive radio networks
top associated keywords A-Z
- cybersecurity16
- wireless networks19
- botnet defence4
- cyberforensics5
- distributed/parallel systems25
- ICT29
- information systems security12
- cloud computing17
- cryptographic protocols6
- cryptography5
- cyberphysical systems12
- data security7
- formal methods6
- mobile ad hoc networks11
- software engineering26
- software security6
- 3D digital imaging15
- aerospace69
- artificial intelligence (AI)53
- attack graphs1
- automated reasoning3
- Boolean functions1
- CDMA20001
- cloud networks2
- cognitive radio networks4
- communication protocols8
- complex dynamic systems19
- computer graphics13
- control systems theory6
- cross-layer design2
- cryptographic algorithms1
- data hiding/embedding1
- data mining21
- detection of vulnerabilities3
- distributed deployment algorithms4
- dynamic scheduling4
- FH-CDMA sequence design1
- Forensic Lucid1
- game theory16
- human-computer interaction (HCI)21
- information technologies25
- intensional logic2
- intrusion detection1
- machine learning58
- malware analysis3
- MPLS (multiprotocol label switching)2
- multicast2
- natural language processing (NLP)15
- network congestion control1
- network optimization4
- network performance evaluation4