Crea il mio profilo
Accesso pubblico
Visualizza tutto9 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Jun Ho HuhSamsung Research, Samsung ElectronicsEmail verificata su samsung.com
- Surya NepalCSIRO’s Data61, AustraliaEmail verificata su csiro.au
- Geumhwan ChoKorea University Sejong CampusEmail verificata su korea.ac.kr
- Yansong (Garrison) GaoThe University of Western AustraliaEmail verificata su uwa.edu.au
- Muhammad Ejaz AhmedCSIRO's Data61Email verificata su data61.csiro.au
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaEmail verificata su data61.csiro.au
- Simon S. WooAssociate Professor, Sungkyunkwan University (SKKU)Email verificata su g.skku.edu
- Dongho WonSungkyunkwan UniversityEmail verificata su security.re.kr
- Sangwon HyunMyongji UniversityEmail verificata su mju.ac.kr
- Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateEmail verificata su psu.edu
- Ross AndersonUniversity of CambridgeEmail verificata su cl.cam.ac.uk
- Seyit A. CamtepeCSIRO Data61Email verificata su ieee.org
- Mahdi Daghmehchi FiroozjaeiAssistant Professor, MacEwan UniversityEmail verificata su macewan.ca
- JaeSeung SongDistinguished Professor of Department of Computer and Information Security, Sejong UniversityEmail verificata su sejong.ac.kr
- William AikenUniversity of OttawaEmail verificata su uottawa.ca
- Eunsoo KimSungkyunkwan UniversityEmail verificata su skku.edu
- JUSOP CHOISungkyunkwan UniversityEmail verificata su skku.edu
- Jihyeon RyuKwangwoon University, Assistant ProfessorEmail verificata su kw.ac.kr
- Youngbae SongKorea Institute of Energy ResearchEmail verificata su kier.re.kr
- Konstantin BeznosovUniversity of British ColumbiaEmail verificata su ece.ubc.ca