Get my own profile
Public access
View all9 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Geumhwan ChoKorea University Sejong CampusVerified email at korea.ac.kr
- Yansong GaoCSIRO's Data61Verified email at data61.csiro.au
- Muhammad Ejaz AhmedCSIRO's Data61Verified email at data61.csiro.au
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
- Simon S. WooAssociate Professor, Sungkyunkwan University (SKKU)Verified email at g.skku.edu
- Dongho WonSungkyunkwan UniversityVerified email at security.re.kr
- Sangwon HyunMyongji UniversityVerified email at mju.ac.kr
- Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
- Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
- Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
- Mahdi Daghmehchi FiroozjaeiAssistant Professor, MacEwan UniversityVerified email at macewan.ca
- JaeSeung SongDistinguished Professor of Department of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
- William AikenUniversity of OttawaVerified email at uottawa.ca
- Eunsoo KimSungkyunkwan UniversityVerified email at skku.edu
- JUSOP CHOISungkyunkwan UniversityVerified email at skku.edu
- Jihyeon RyuKwangwoon University, Assistant ProfessorVerified email at security.re.kr
- Youngbae SongKorea Institute of Energy ResearchVerified email at kier.re.kr
- Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca