Get my own profile
Public access
View all21 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
KokSheik WongMonash University MalaysiaVerified email at monash.edu
Chee-Ming TingAssociate Professor, Monash University. PhD (Maths - Statistics)Verified email at monash.edu
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Willi MeierFHNWVerified email at fhnw.chLIONG SZE TENGFENG CHIA UNIVERSITYVerified email at mail.fcu.edu.tw
Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
Yogachandran RAHULAMATHAVANReader in Cybersecurity and Privacy, Loughborough University, UKVerified email at lboro.ac.uk
Wai Kong LeeUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Vishnu Monn BaskaranSchool of Information Technology, Monash University, Malaysia.Verified email at monash.edu
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Hernando OmbaoProfessor of Statistics, King Abdullah University of Science and TechnologyVerified email at kaust.edu.saGlenford MappAssociate Professor, Middlesex UniversityVerified email at mdx.ac.uk
Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
Jonathon A ChambersEmeritus Professor, University of LeicesterVerified email at le.ac.uk
Mahdi AiashAssociate Professor in Computer Science and Cyber SecurityVerified email at mdx.ac.uk
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk