Crea il mio profilo
Coautori
- Huy Kang KimSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Seonghoon JeongPostdoctoral Researcher, BK21FOUR R&E Center for Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Junseok KimHyundai Motor CompanyEmail verificata su hyundai.com
- Faisal Abdulaziz AlfouzanGlasgow Caledonian UniversityEmail verificata su gcu.ac.uk
- Ho Kyun OhKorea UniversityEmail verificata su korea.ac.kr
- Suhyeon LeeKorea UniversityEmail verificata su korea.ac.kr
- Jihoon KimEmail verificata su korea.ac.kr
- Sundaresan RamachandranNaif Arab University for Security SciencesEmail verificata su nauss.edu.sa
- Jihun SonSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- K.H.KimKorea UniversityEmail verificata su korea.ac.kr
- Hyun Jung LeekoscomEmail verificata su korea.ac.kr
- Tanveer ZiaProfessor of Computer Science, University of Notre Dame AustraliaEmail verificata su nd.edu.au
- Dr. Nouf AlzahraniEmail verificata su bu.edu.sa
- Dr. Digvijaysinh M. RathodAssociate Professor and Associate Dean, National Forensic Sciences UniversityEmail verificata su nfsu.ac.in
- Abhinav ShahNational Forensic Sciences UniversityEmail verificata su nfsu.ac.in
- 이상진고려대 정보보호대학원Email verificata su korea.ac.kr
- Sangjin LeeDFRC, ICSP, School of Cyber Security, Korea Univ.Email verificata su korea.ac.kr