Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Dan Dongseong KimThe University of Queensland (UQ), Deputy Director, UQ CybersecurityVerified email at uq.edu.au
Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
Mengmeng GeMonash UniversityVerified email at monash.edu
Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Hani AlzaidKing Abdulaziz City for Science and TechnologyVerified email at kacst.edu.sa
Donghwan LeeAgency for Defense DevelopmentVerified email at add.re.krArmstrong NhlabatsiKINDI Center for Computing Research, Qatar UniversityVerified email at qu.edu.qa
Kolawole John AdebayoMaynooth UniversityVerified email at mu.ie
Julian Jang-JaccardCyber-Defence Campus, Swiss Federal Office for Defence Procurement armarsuisseVerified email at ar.admin.ch
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Dilli Prasad SharmaUniversity of TorontoVerified email at utoronto.ca
Olufade Falade Williams ONIFADEUniversity of Ibadan, Computer Science DeptVerified email at mail.ui.edu.ng
Olumide LongeWest Midlands Open UniversityVerified email at fulbrightmail.org
Taiwo KOLAJO (PhD)Federal University LokojaVerified email at fulokoja.edu.ng