Get my own profile
Public access
View all22 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityVerified email at duke.edu
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
Simon Yusuf EnochVerified email at uq.edu.au
Fumio MachidaUniversity of TsukubaVerified email at ieee.org
Khaled KhanQatar UniversityVerified email at qu.edu.qa
Noora FetaisQatar UniversityVerified email at qu.edu.qa
Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Ke HeUniverisity of AucklandVerified email at aucklanduni.ac.nz
Ermeson Carneiro de AndradeAssociate Professor, Federal Rural University of PernambucoVerified email at ufrpe.br
Nguyen Ha NamEPU, VNU-UETVerified email at vnu.edu.vn
Anh Nguyen TuanVerified email at konkuk.ac.kr
Jślio MendonēaPostdoctoral researcher, SnT - CritiX, University of LuxembourgVerified email at uni.lu
Dijiang HuangArizona State UniversityVerified email at asu.edu
Paulo Romero Martins MacielUniversidade Federal de PernambucoVerified email at cin.ufpe.br
Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
Follow
Dan Dongseong KIM
Associate Professor (softly equivalent to a Full Professor in the US), The University of Queensland
Verified email at uq.edu.au - Homepage