Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
Simon Yusuf EnochVerified email at uq.edu.au
Armstrong NhlabatsiQatar UniversityVerified email at qu.edu.qa
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Hani AlzaidKing Abdulaziz City for Science and TechnologyVerified email at kacst.edu.sa
Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
Chun-Jen ChungArizona State UniversityVerified email at asu.edu
Dijiang HuangArizona State UniversityVerified email at asu.edu
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
JUSOP CHOISungkyunkwan UniversityVerified email at skku.edu
Beomjin JinSungkyunkwan UniversityVerified email at skku.edu
Rachel Cardell-OliverThe University of Western AustraliaVerified email at uwa.edu.au
Ajmal Saeed MianProfessor at The University of Western AustraliaVerified email at uwa.edu.au
Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityVerified email at duke.edu
Fumio MachidaUniversity of TsukubaVerified email at ieee.org
Larry HuynhUniversity of Western AustraliaVerified email at uwa.edu.au