Get my own profile
Public access
View all8 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Sunghwan KimSamsung Research, Samsung ElectronicsVerified email at samsung.com
Dilli P. SharmaUniversity of TorontoVerified email at utoronto.ca
Taejin HAGwangju Institute of Science and TechnologyVerified email at gist.ac.kr
Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
Jargalsaikhan NarantuyaKakaoenterpriseVerified email at kakaoenterprise.com
Yohan KimDongseo UniversityVerified email at dongseo.ac.kr
Aris Cahyadi RisdiantoResearch Fellow at National University of SingaporeVerified email at comp.nus.edu.sg
Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
Charles KamhouaDEVCOM Army Research Laboratory, Network Security BranchVerified email at army.mil
Nandi LesliePrincipal Technical Fellow, Raytheon TechnologiesVerified email at rtx.com
Namwon AnPh.D. candidate, Gwangju Institute of Science and Technology (GIST)Verified email at gist.ac.kr
Ing-Ray ChenVirginia TechVerified email at vt.edu