Get my own profile
Public access
View all20 articles
4 articles
available
not available
Based on funding mandates
Co-authors
- Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
- John SeeAssociate Professor, Heriot-Watt University MalaysiaVerified email at hw.ac.uk
- KokSheik WongMonash University MalaysiaVerified email at monash.edu
- Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
- Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
- Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
- LIONG SZE TENGFENG CHIA UNIVERSITYVerified email at mail.fcu.edu.tw
- Willi MeierFHNWVerified email at fhnw.ch
- Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
- Yogachandran RAHULAMATHAVANReader in Cybersecurity and Privacy, Loughborough University, UKVerified email at lboro.ac.uk
- Chee-Ming TingAssociate Professor, Monash University. PhD (Maths - Statistics)Verified email at monash.edu
- Wai Kong LeeUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
- Vishnu Monn BaskaranSchool of Information Technology, Monash University, Malaysia.Verified email at monash.edu
- Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
- Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
- Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
- Jonathon A ChambersEmeritus Professor, University of LeicesterVerified email at le.ac.uk
- Glenford MappAssociate Professor, Middlesex UniversityVerified email at mdx.ac.uk
- Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
- Yandan WangLecturer of Wenzhou UniversityVerified email at wzu.edu.cn