Crea il mio profilo
Accesso pubblico
Visualizza tutto21 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jin B. HongThe University of Western AustraliaEmail verificata su uwa.edu.au
- Kishor TrivediChaired Professor of Electrical and Computer Engineering, Duke UniversityEmail verificata su duke.edu
- Mengmeng GeUniversity of CanterburyEmail verificata su canterbury.ac.nz
- Jin-Hee ChoComputer Science Department, Virginia TechEmail verificata su vt.edu
- Simon Yusuf EnochEmail verificata su uq.edu.au
- Hyuk LimKorea Institute of Energy Technology (KENTECH)Email verificata su kentech.ac.kr
- Terrence J MooreUS Army Research LaboratoryEmail verificata su army.mil
- Fumio MachidaUniversity of TsukubaEmail verificata su ieee.org
- Khaled KhanQatar UniversityEmail verificata su qu.edu.qa
- Noora FetaisQatar UniversityEmail verificata su qu.edu.qa
- Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseEmail verificata su ar.admin.ch
- Huy Kang KimSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Ermeson Carneiro de AndradeAssociate Professor, Federal Rural University of PernambucoEmail verificata su ufrpe.br
- Nguyen Ha NamEPU, VNU-UETEmail verificata su vnu.edu.vn
- NGUYEN TUAN ANHAcademic Research Assistant Professor (학술연구교수), Konkuk UniversityEmail verificata su konkuk.ac.kr
- Júlio MendonçaPostdoctoral researcher, CritiX, University of LuxembourgEmail verificata su uni.lu
- Dijiang HuangArizona State UniversityEmail verificata su asu.edu
- Paulo Romero Martins MacielUniversidade Federal de PernambucoEmail verificata su cin.ufpe.br
- Ke HeUniverisity of AucklandEmail verificata su aucklanduni.ac.nz
- Noam Ben-AsherBoston FusionEmail verificata su bostonfusion.com
Segui
Dan Dongseong KIM
Associate Professor (softly equivalent to a Full Professor in the US), The University of Queensland
Email verificata su uq.edu.au - Home page