Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
- Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
- Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
- Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
- Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
- Arash Habibi LashkariCanada Research Chair and Associate Professor in Cybersecurity @ York UniversityVerified email at yorku.ca
- Mona ParizadehPostdoctoral AssociateVerified email at ucalgary.ca
- Simon Yusuf EnochVerified email at uq.edu.au
- HongXiang GengUniversity of TorontoVerified email at mail.utoronto.ca
- Alberto Leon GarciaUniversity of TorontoVerified email at utoronto.ca
- Nikhill VombatkereGraduate Student, University of CalgaryVerified email at ucalgary.ca
- Sepideh NiktabeMaster Student,York UniversityVerified email at yorku.ca
- Duc-Phong LeFintech Technical Researcher (Cryptographer), Bank of CanadaVerified email at bankofcanada.ca
- Nasim Beigi MohammadiPostdoctoral fellow, University of TorontoVerified email at utoronto.ca
- Masoud ErfaniPwC Canada - University of New BrunswickVerified email at unb.ca
- Ali A. GhorbaniProfessor and Canada Research Chair in CybersecurityVerified email at unb.ca
- Barjinder kaurEvaluation Officer, Horizon Health NetworkVerified email at horizonnb.ca
- Farzaneh ShoelehVerafin Inc.Verified email at nasdaq.com