Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandEmail verificata su uq.edu.au
- Mengmeng GeUniversity of CanterburyEmail verificata su canterbury.ac.nz
- Simon Yusuf EnochEmail verificata su uq.edu.au
- Armstrong NhlabatsiQatar UniversityEmail verificata su qu.edu.qa
- Hyoungshick KimSungkyunkwan UniversityEmail verificata su skku.edu
- Hani AlzaidKing Abdulaziz City for Science and TechnologyEmail verificata su kacst.edu.sa
- Huy Kang KimSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseEmail verificata su ar.admin.ch
- Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityEmail verificata su latrobe.edu.au
- Chun-Jen ChungArizona State UniversityEmail verificata su asu.edu
- Dijiang HuangArizona State UniversityEmail verificata su asu.edu
- Hyuk LimKorea Institute of Energy Technology (KENTECH)Email verificata su kentech.ac.kr
- Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Email verificata su kentech.ac.kr
- JUSOP CHOISungkyunkwan UniversityEmail verificata su skku.edu
- Beomjin JinSungkyunkwan UniversityEmail verificata su skku.edu
- Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityEmail verificata su duke.edu
- Fumio MachidaUniversity of TsukubaEmail verificata su ieee.org
- Rachel Cardell-OliverThe University of Western AustraliaEmail verificata su uwa.edu.au
- Ajmal Saeed MianProfessor at The University of Western AustraliaEmail verificata su uwa.edu.au
- Larry HuynhUniversity of Western AustraliaEmail verificata su uwa.edu.au