Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Huy Kang KimSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Ah Reum KangPai Chai UniversityEmail verificata su arkang.net
- Junseok KimHyundai Motor CompanyEmail verificata su hyundai.com
- Dr. Kyounggon KimAssistant Professor, Head of Cybercrime Division, Naif Arab University for Security SciencesEmail verificata su nauss.edu.sa
- David MohaisenProfessor of Computer Science, University of Central FloridaEmail verificata su ucf.edu
- Hyun Min SongAssistant Professor at Dankook UniversityEmail verificata su dankook.ac.kr
- Yuseung NohPh.D. student at Korea UniversityEmail verificata su korea.ac.kr
- Minsoo RyuSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Hyunjae KangSchool of Cybersecurity, Korea UniversityEmail verificata su korea.ac.kr
- Sangho LeeSamsung ResearchEmail verificata su samsung.com
- Hwejae LeeSchool of CyberSecurity, Korea UniversityEmail verificata su korea.ac.kr
- Mee Lan HanAssistant Professor, Dept. of AI Cyber Security, Korea University SejongEmail verificata su korea.ac.kr
- Byung Il KwakAssistant Professor, Division of Software, Hallym UniversityEmail verificata su hallym.ac.kr
- Ji Young WooSoonchunhyang UniversityEmail verificata su sch.ac.kr
Segui
Seonghoon Jeong
Altri nomi정 성훈
Postdoctoral Researcher, BK21FOUR R&E Center for Cybersecurity, Korea University
Email verificata su korea.ac.kr - Home page