Get my own profile
Public access
View all10 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Geumhwan ChoKorea University Sejong CampusVerified email at korea.ac.kr
Yansong (Garrison) GaoThe University of Western AustraliaVerified email at uwa.edu.au
Muhammad Ejaz AhmedCSIRO's Data61Verified email at data61.csiro.au
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Simon S. WooAssociate Professor, Sungkyunkwan University (SKKU)Verified email at g.skku.edu
Dongho WonSungkyunkwan UniversityVerified email at security.re.kr
Sangwon HyunMyongji UniversityVerified email at mju.ac.kr
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
Mahdi Daghmehchi FiroozjaeiAssistant Professor, MacEwan UniversityVerified email at macewan.ca
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
JaeSeung SongDistinguished Professor of Department of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
William AikenUniversity of OttawaVerified email at uottawa.ca
Eunsoo KimSungkyunkwan UniversityVerified email at skku.edu
Jihyeon RyuKwangwoon University, Assistant ProfessorVerified email at kw.ac.kr
JUSOP CHOISungkyunkwan UniversityVerified email at skku.edu
Youngbae SongKorea Institute of Energy ResearchVerified email at kier.re.kr
Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca