Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Geumhwan ChoSungkyunkwan UniversityVerified email at skku.edu
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Yansong GaoCSIRO's Data61Verified email at data61.csiro.au
Muhammad Ejaz AhmedCSIRO's Data61Verified email at data61.csiro.au
Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
Alsharif (Sharif) AbuadbbaSenior Resreach Scientist - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
JaeSeung SongProfessor of Department of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
Sangwon HyunMyongji UniversityVerified email at mju.ac.kr
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Simon S. WooAssistant Professor, Sungkyunkwan University (SKKU)Verified email at g.skku.edu
Mahdi Daghmehchi FiroozjaeiAssistant Professor, University of WindsorVerified email at uwindsor.ca
Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca
Youngbae SongKorea Institute of Energy ResearchVerified email at kier.re.kr
Jihyeon RyuKwangwoon University, Assistant ProfessorVerified email at security.re.kr
Eiko YonekiComputer Laboratory, University of CambridgeVerified email at cl.cam.ac.uk
Jaehoon (Paul) JeongSungkyunkwan University, Department of Computer Science and Engineering, Associate ProfessorVerified email at skku.edu
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Eunsoo KimSungkyunkwan UniversityVerified email at skku.edu
Seongyeol OhJunior Technician, Cyber Security Team, Korea Atomic Energy Research InstituteVerified email at kaeri.re.kr