Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
- Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
- Simon Yusuf EnochVerified email at uq.edu.au
- Armstrong NhlabatsiQatar UniversityVerified email at qu.edu.qa
- Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
- Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Hani AlzaidKing Abdulaziz City for Science and TechnologyVerified email at kacst.edu.sa
- Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
- Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
- Chun-Jen ChungArizona State UniversityVerified email at asu.edu
- Dijiang HuangArizona State UniversityVerified email at asu.edu
- Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- JUSOP CHOISungkyunkwan UniversityVerified email at skku.edu
- Ajmal Saeed MianProfessor at The University of Western AustraliaVerified email at uwa.edu.au
- Beomjin JinSungkyunkwan UniversityVerified email at skku.edu
- Larry HuynhUniversity of Western AustraliaVerified email at uwa.edu.au
- Rachel Cardell-OliverThe University of Western AustraliaVerified email at uwa.edu.au
- Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityVerified email at duke.edu
- Fumio MachidaUniversity of TsukubaVerified email at ieee.org