Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Dan Dongseong KIMDeputy Director, UQ Cybersecurity; Associate Professor, The University of QueenslandVerified email at uq.edu.au
Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
Hani AlzaidKing Abdulaziz City for Science and TechnologyVerified email at kacst.edu.sa
Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Donghwan LeeAgency for Defense DevelopmentVerified email at add.re.kr
Armstrong NhlabatsiQatar UniversityVerified email at qu.edu.qa
Noora FetaisQatar UniversityVerified email at qu.edu.qa
Kolawole John AdebayoMaynooth UniversityVerified email at mu.ie
Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Dilli SharmaUniversity of TorontoVerified email at utoronto.ca
Olufade Falade Williams ONIFADEUniversity of Ibadan, Computer Science DeptVerified email at mail.ui.edu.ng
Olumide LongeWest Midlands Open UniversityVerified email at fulbrightmail.org
Taiwo KOLAJO (PhD)Federal University LokojaVerified email at fulokoja.edu.ng