Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
- Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
- Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
- Hani AlzaidKing Abdulaziz City for Science and TechnologyVerified email at kacst.edu.sa
- Donghwan LeeAgency for Defense DevelopmentVerified email at add.re.kr
- Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Armstrong NhlabatsiQatar UniversityVerified email at qu.edu.qa
- Noora FetaisQatar UniversityVerified email at qu.edu.qa
- Kolawole John AdebayoMaynooth UniversityVerified email at mu.ie
- Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
- Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
- Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
- Dilli SharmaUniversity of TorontoVerified email at utoronto.ca
- Olufade Falade Williams ONIFADEUniversity of Ibadan, Computer Science DeptVerified email at mail.ui.edu.ng
- Olumide LongeWest Midlands Open UniversityVerified email at fulbrightmail.org
- Taiwo KOLAJO (PhD)Federal University LokojaVerified email at fulokoja.edu.ng