Crea il mio profilo
Coautori
- Raphaël C.-W. PhanProfessor at Monash UniversityEmail verificata su monash.edu
- Swee-Huay HengMultimedia UniversityEmail verificata su mmu.edu.my
- Cheong Soon NyeanMultimedia UniversityEmail verificata su mmu.edu.my
- Teh Pei LeeProfessor, School of Business, Monash University MalaysiaEmail verificata su monash.edu
- KokSheik WongMonash University MalaysiaEmail verificata su monash.edu
- John SeeAssociate Professor, Heriot-Watt University MalaysiaEmail verificata su hw.ac.uk
- Vik Tor GohMultimedia UniversityEmail verificata su mmu.edu.my
- Osamah Ibrahiem AbdullazizNational Chiao Tung UniversityEmail verificata su nctu.edu.tw
- Pervaiz AhmedSunway UniversityEmail verificata su sunway.edu.my
- Adamu Muhammad BuhariSchool of Information Technology, Monash University Malaysia.Email verificata su monash.edu
- Vishnu Monn BaskaranSchool of Information Technology, Monash University, Malaysia.Email verificata su monash.edu
- Yap Wen JiunFaculty of Engineering, Multimedia UniversityEmail verificata su mmu.edu.my
- Yoga RahulamathavanReader in Cybersecurity and Privacy, Loughborough University, UKEmail verificata su lboro.ac.uk
- Yandan WangLecturer of Wenzhou UniversityEmail verificata su wzu.edu.cn
- Ji-Jian ChinUniversity of PlymouthEmail verificata su plymouth.ac.uk
- Wun-She YapUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Wei-Chuen YauXiamen University MalaysiaEmail verificata su xmu.edu.my
- Syh Yuan TanNewcastle UniversityEmail verificata su newcastle.ac.uk
- Iftekhar SalamXiamen University MalaysiaEmail verificata su xmu.edu.my
- Geong Sen PohCyber Security AI R & DEmail verificata su ntu.edu.sg