Get my own profile
Public access
View all15 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityVerified email at duke.edu
Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
Simon Yusuf EnochVerified email at uq.edu.au
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Fumio MachidaUniversity of TsukubaVerified email at ieee.org
Khaled KhanQatar UniversityVerified email at qu.edu.qa
Noora FetaisQatar UniversityVerified email at qu.edu.qa
Prof. Julian Jang-JaccardCyber-Defence Campus (CYD), armasuisse, Federal Department of DefenseVerified email at ar.admin.ch
Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Nguyen Ha NamEPU, VNU-UETVerified email at vnu.edu.vn
NGUYEN TUAN ANHAcademic Research Assistant Professor (학술연구교수), Konkuk UniversityVerified email at konkuk.ac.kr
Ermeson Carneiro de AndradeAssociate Professor, Federal Rural University of PernambucoVerified email at ufrpe.br
Dijiang HuangArizona State UniversityVerified email at asu.edu
Paulo Romero Martins MacielUniversidade Federal de PernambucoVerified email at cin.ufpe.br
Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
Jślio MendonēaPostdoctoral researcher, CritiX, University of LuxembourgVerified email at uni.lu
Deep MedhiProgram Director, National Science FoundationVerified email at nsf.gov
Follow
Dan Dongseong KIM
Associate Professor (softly equivalent to a Full Professor in the US), The University of Queensland
Verified email at uq.edu.au - Homepage