Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandEmail verificata su uq.edu.au
- Jin B. HongThe University of Western AustraliaEmail verificata su uwa.edu.au
- Mengmeng GeUniversity of CanterburyEmail verificata su canterbury.ac.nz
- Hani AlzaidKing Abdulaziz City for Science and TechnologyEmail verificata su kacst.edu.sa
- Armstrong NhlabatsiQatar UniversityEmail verificata su qu.edu.qa
- Huy Kang KimSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Donghwan LeeAgency for Defense DevelopmentEmail verificata su add.re.kr
- Kolawole John AdebayoDublin City UniversityEmail verificata su dcu.ie
- Noora FetaisQatar UniversityEmail verificata su qu.edu.qa
- Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseEmail verificata su ar.admin.ch
- Jin-Hee ChoComputer Science Department, Virginia TechEmail verificata su vt.edu
- Hyuk LimKorea Institute of Energy Technology (KENTECH)Email verificata su kentech.ac.kr
- Terrence J MooreUS Army Research LaboratoryEmail verificata su army.mil
- Dilli SharmaUniversity of TorontoEmail verificata su utoronto.ca
- Olufade Falade Williams ONIFADEUniversity of Ibadan, Computer Science DeptEmail verificata su mail.ui.edu.ng
- Olumide LongeAmerican University of Nigeria - Fulbright Fellow & Research Scholar, Southern University, BatonEmail verificata su fulbrightmail.org
- Taiwo KOLAJO (PhD)Federal University LokojaEmail verificata su fulokoja.edu.ng