Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Wei-Chuen YauXiamen University MalaysiaEmail verificata su xmu.edu.my
- Josef PieprzykCSIRO Data61Email verificata su csiro.au
- Leonie SimpsonSenior Lecturer, Science and Engineering Faculty, Queensland University of TechnologyEmail verificata su qut.edu.au
- Edward DawsonEmeritus Professor Queensland University of TechnologyEmail verificata su qut.edu.au
- Raphaël C.-W. PhanProfessor at Monash UniversityEmail verificata su monash.edu
- Madhusudan SinghOregon Institute Technology (Oregon Tech)Email verificata su oit.edu
- Pardeep kumarSwansea UniversityEmail verificata su swansea.ac.uk
- Janaka AlawatugodaRabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, AustraliaEmail verificata su ra.ac.ae
- Swee-Huay HengMultimedia UniversityEmail verificata su mmu.edu.my
- Wun-She YapUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Ji-Jian ChinUniversity of PlymouthEmail verificata su plymouth.ac.uk
- Huo-Chong LingResearcher@RMIT University VietnamEmail verificata su rmit.edu.vn
- Syh Yuan TanNewcastle UniversityEmail verificata su newcastle.ac.uk
- Geong Sen PohCyber Security AI R & DEmail verificata su ntu.edu.sg
- Kamran Siddique, SMIEEEDepartment of Computer Science and Engineering, University of Alaska, USAEmail verificata su alaska.edu
- Muammer TürkoğluSamsun ÜniversitesiEmail verificata su samsun.edu.tr
- Abdulkadir SengurFirat UniversityEmail verificata su firat.edu.tr
- Mohammad Arif Sobhan BhuiyanXiamen University MalaysiaEmail verificata su xmu.edu.my
- Kelvin J. A. OoiXiamen University MalaysiaEmail verificata su xmu.edu.my
- Lee HoonJaeProf. of Dept. Information Security, Dongseo Univ.Email verificata su dongseo.ac.kr