Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Geumhwan ChoSungkyunkwan UniversityVerified email at skku.edu
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Yansong GaoCSIRO's Data61Verified email at data61.csiro.au
Muhammad Ejaz AhmedCSIRO's Data61Verified email at data61.csiro.au
Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Sangwon HyunMyongji UniversityVerified email at mju.ac.kr
JaeSeung SongProfessor of Department of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
Simon S. WooAssociate Professor, Sungkyunkwan University (SKKU)Verified email at g.skku.edu
Mahdi Daghmehchi FiroozjaeiAssistant Professor, MacEwan UniversityVerified email at macewan.ca
Jihyeon RyuKwangwoon University, Assistant ProfessorVerified email at security.re.kr
Youngbae SongKorea Institute of Energy ResearchVerified email at kier.re.kr
Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca
Jaehoon (Paul) JeongSungkyunkwan University, Department of Computer Science and Engineering, Associate ProfessorVerified email at skku.edu
Eiko YonekiComputer Laboratory, University of CambridgeVerified email at cl.cam.ac.uk
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Eunsoo KimSungkyunkwan UniversityVerified email at skku.edu
Seongyeol OhJunior Technician, Cyber Security Team, Korea Atomic Energy Research InstituteVerified email at kaeri.re.kr