Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
- Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
- Hootan AlavizadehWright State UniversityVerified email at wright.edu
- Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
- Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
- Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
- Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
- Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
- Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
- Sibghat Ullah BazaiBalochistan University of Information Technology Engineering and Management SciencesVerified email at buitms.edu.pk
- Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
- Harith Al-SahafSenior Lecturer, Victoria University of WellingtonVerified email at ecs.vuw.ac.nz
- Ian WelchAssociate Professor, Victoria University at Wellington, New ZealandVerified email at ecs.vuw.ac.nz
- Samin ArefEngineering and Data Science, University of TorontoVerified email at utoronto.ca
- Nigel PhairMonash UniversityVerified email at monash.edu
- Hans W. GuesgenProfessor of Computer Science, Massey University, New ZealandVerified email at massey.ac.nz
Follow
Hooman Alavizadeh
Lecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe University
Verified email at latrobe.edu.au - Homepage