Get my own profile
Public access
View all11 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Geumhwan ChoKorea University Sejong CampusVerified email at korea.ac.kr
Yansong (Garrison) GaoThe University of Western AustraliaVerified email at uwa.edu.au
Muhammad Ejaz AhmedCSIRO's Data61Verified email at data61.csiro.au
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Simon S. WooAssociate Professor, Sungkyunkwan University (SKKU)Verified email at g.skku.edu
Dongho WonSungkyunkwan UniversityVerified email at security.re.kr
Sangwon HyunMyongji UniversityVerified email at mju.ac.kr
Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Mahdi Daghmehchi FiroozjaeiAssistant Professor, MacEwan UniversityVerified email at macewan.ca
JaeSeung SongDistinguished Professor of Department of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
William AikenUniversity of OttawaVerified email at uottawa.ca
Eunsoo KimSungkyunkwan UniversityVerified email at skku.edu
JUSOP CHOISungkyunkwan UniversityVerified email at skku.edu
Jihyeon RyuKwangwoon University, Assistant ProfessorVerified email at kw.ac.kr
Youngbae SongKorea Institute of Energy ResearchVerified email at kier.re.kr
Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca