Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
17 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Anand PaulKyungpook National UniversityEmail verificata su knu.ac.kr
- Irfan MehmoodUniversity of BradfordEmail verificata su bradford.ac.uk
- Awais AhmadImam Mohammad Ibn Saud Islamic University, Riyadh, Kingdom of Saudi ArabiaEmail verificata su imamu.edu.sa
- Muhammad SajjadDept. of Computer ScienceEmail verificata su icp.edu.pk
- Khan Muhammad, PhD (Digital Conte...VIS2KNOW Lab, Department of Applied AI, Sungkyunkwan University, Seoul 03063, South KoreaEmail verificata su skku.edu
- Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneEmail verificata su latrobe.edu.au
- Yunyoung NamSoonchunhyang UniversityEmail verificata su sch.ac.kr
- Sohail Jabbar - Prof. of Computer Scie...Al Imam Muhammad Ibn Saud Islamic University, Riyadh, Saudia ArabiaEmail verificata su imamu.edu.sa
- Daehoon KimPh.D, Korea UniversityEmail verificata su korea.ac.kr
- Sang-Soo YeoMokwon UniversityEmail verificata su mokwon.ac.kr
- Seheon SongAjou Univ.Email verificata su ajou.ac.kr
- Wenny RahayuProfessor in Computer Science, La Trobe University, AustraliaEmail verificata su latrobe.edu.au
- Uyen Trang NguyenProfessor of Computer Science, York UniversityEmail verificata su cse.yorku.ca
- Geyong MinUniversity of ExeterEmail verificata su exeter.ac.uk
Segui
Seungmin Rho
Department of Industrial Security, Chung-Ang University, Korea
Email verificata su cau.ac.kr - Home page