Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
3 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- John SeeAssociate Professor, Heriot-Watt University MalaysiaEmail verificata su hw.ac.uk
- KokSheik WongMonash University MalaysiaEmail verificata su monash.edu
- Swee-Huay HengMultimedia UniversityEmail verificata su mmu.edu.my
- Jean-Philippe AumassonKudelski SecurityEmail verificata su kudelskisecurity.com
- Wei-Chuen YauXiamen University MalaysiaEmail verificata su xmu.edu.my
- Willi MeierFHNWEmail verificata su fhnw.ch
- Huo-Chong LingResearcher@RMIT University VietnamEmail verificata su rmit.edu.vn
- LIONG SZE TENGFENG CHIA UNIVERSITYEmail verificata su mail.fcu.edu.tw
- Yoga RahulamathavanReader in Cybersecurity and Privacy, Loughborough University, UKEmail verificata su lboro.ac.uk
- Wai Kong LeeUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonEmail verificata su city.ac.uk
- Wun-She YapUniversiti Tunku Abdul RahmanEmail verificata su utar.edu.my
- Glenford MappAssociate Professor, Middlesex UniversityEmail verificata su mdx.ac.uk
- Ji-Jian ChinUniversity of PlymouthEmail verificata su plymouth.ac.uk
- Vishnu Monn BaskaranSchool of Information Technology, Monash University, Malaysia.Email verificata su monash.edu
- Jonathon A ChambersEmeritus Professor, University of LeicesterEmail verificata su le.ac.uk
- Syh Yuan TanNewcastle UniversityEmail verificata su newcastle.ac.uk
- Chee-Ming TingAssociate Professor, Monash University. PhD (Maths - Statistics)Email verificata su monash.edu
- Yandan WangLecturer of Wenzhou UniversityEmail verificata su wzu.edu.cn