Get my own profile
Public access
View all20 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Bok-Min GoiProfessor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
John SeeAssociate Professor, Heriot-Watt University MalaysiaVerified email at hw.ac.uk
KokSheik WongMonash University MalaysiaVerified email at monash.edu
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Willi MeierFHNWVerified email at fhnw.ch
Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
LIONG SZE TENGFENG CHIA UNIVERSITYVerified email at mail.fcu.edu.tw
Yoga RahulamathavanLoughborough University London, UKVerified email at lboro.ac.uk
Wai Kong LeeGachon UniversityVerified email at gachon.ac.kr
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Glenford MappAssociate Professor, Middlesex UniversityVerified email at mdx.ac.uk
Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
Jonathon A ChambersEmeritus Professor, University of LeicesterVerified email at le.ac.uk
Mahdi AiashMiddlesex UniversityVerified email at mdx.ac.uk
Vishnu Monn BaskaranSchool of Information Technology, Monash University, Malaysia.Verified email at monash.edu
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
Yandan WangLecturer of Wenzhou UniversityVerified email at wzu.edu.cn