Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dan Dongseong KIMDeputy Director, UQ Cybersecurity; Associate Professor, The University of QueenslandVerified email at uq.edu.au
Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
Simon Yusuf EnochVerified email at uq.edu.au
Armstrong NhlabatsiQatar UniversityVerified email at qu.edu.qa
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Hani AlzaidKing Abdulaziz City for Science and TechnologyVerified email at kacst.edu.sa
Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
Larry HuynhUniversity of Western AustraliaVerified email at uwa.edu.au
Chun-Jen ChungArizona State UniversityVerified email at asu.edu
Dijiang HuangArizona State UniversityVerified email at asu.edu
Ajmal Saeed MianProfessor at The University of Western AustraliaVerified email at uwa.edu.au
Rachel Cardell-OliverThe University of Western AustraliaVerified email at uwa.edu.au
JUSOP CHOISungkyunkwan UniversityVerified email at skku.edu
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Beomjin JinSungkyunkwan UniversityVerified email at skku.edu
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityVerified email at duke.edu