Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
Mengmeng GeUniversity of CanterburyVerified email at canterbury.ac.nz
Hani AlzaidKing Abdulaziz City for Science and TechnologyVerified email at kacst.edu.sa
Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Donghwan LeeAgency for Defense DevelopmentVerified email at add.re.kr
Armstrong NhlabatsiQatar UniversityVerified email at qu.edu.qa
Noora FetaisQatar UniversityVerified email at qu.edu.qa
Kolawole John AdebayoDublin City UniversityVerified email at dcu.ie
Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Dilli SharmaUniversity of TorontoVerified email at utoronto.ca
Olufade Falade Williams ONIFADEUniversity of Ibadan, Computer Science DeptVerified email at mail.ui.edu.ng
Olumide LongeAmerican University of Nigeria - Fulbright Fellow & Research Scholar, Southern University, BatonVerified email at fulbrightmail.org
Taiwo KOLAJO (PhD)Federal University LokojaVerified email at fulokoja.edu.ng