Get my own profile
Public access
View all15 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.comSurya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Geumhwan ChoKorea University Sejong CampusVerified email at korea.ac.kr
Yansong (Garrison) GaoThe University of Western AustraliaVerified email at uwa.edu.au
Alsharif (Sharif) AbuadbbaTeam Lead - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Simon S. WooAssociate Professor, Sungkyunkwan University (SKKU)Verified email at g.skku.edu
Muhammad Ejaz AhmedCSIRO's Data61Verified email at data61.csiro.auDongho WonSungkyunkwan UniversityVerified email at security.re.kr
Sangwon HyunMyongji UniversityVerified email at mju.ac.krJungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
Seyit A. CamtepeCSIRO Data61, Cyber Security Automation and OrchestrationVerified email at ieee.org
Mahdi Daghmehchi FiroozjaeiAssistant Professor, MacEwan UniversityVerified email at macewan.ca
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Eunsoo KimSungkyunkwan UniversityVerified email at skku.edu
JaeSeung SongDistinguished Professor of Department of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
William AikenUniversity of OttawaVerified email at uottawa.ca
Jihyeon RyuKwangwoon University, Assistant ProfessorVerified email at kw.ac.kr
JUSOP CHOISungkyunkwan UniversityVerified email at skku.eduSanghak OhSungkyunkwan UniversityVerified email at skku.edu
Zhi ZhangThe University of Western AustraliaVerified email at uwa.edu.au