Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jon MuzioProfessor of Computer Science, University of VictoriaVerified email at cs.uvic.ca
Kenneth B KentUniversity of New BrunswickVerified email at unb.ca
Mitchell A ThorntonSouthern Methodist University, Darwin Deason Institute for Cyber SecurityVerified email at ieee.org
Mozammel H A KhanProfessor, Computer Science and Engineering, East West University, Dhaka, BangladeshVerified email at ewubd.edu
Zamilur Rahman, PhDAssistant Professor, School of Computer Science and Technology, Algoma UniversityVerified email at algomau.ca
Micaela SerraProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
Francois TaianiProfessor - Univ Rennes, Inria, CNRS, IRISAVerified email at computer.org
Professor Paul RaysonSchool of Computing and Communications, Lancaster University, UKVerified email at lancaster.ac.uk
Wendy OsbornAssociate Professor, University of LethbridgeVerified email at uleth.ca
Barry GergelDepartment of Computing Science, University of AlbertaVerified email at ualberta.ca
Gongbing ShanProfessor of Biomechanics, University of Lethbridge, CanadaVerified email at uleth.ca
Bradley EllertVerified email at uleth.ca