Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun Ho HuhSamsung Research, Samsung ElectronicsVerified email at samsung.com
Geumhwan ChoSungkyunkwan UniversityVerified email at skku.edu
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Yansong GaoData61, CSIROVerified email at data61.csiro.au
Muhammad Ejaz AhmedCSIRO's Data61Verified email at data61.csiro.au
Jungwoo Ryoo, Ph.D., CISSP, CISAPenn StateVerified email at psu.edu
Alsharif (Sharif) AbuadbbaSenior Resreach Scientist - CSIRO's Data61Verified email at data61.csiro.au
JaeSeung SongProfessor of Department of Computer and Information Security, Sejong UniversityVerified email at sejong.ac.kr
Sangwon HyunMyongji UniversityVerified email at mju.ac.kr
Ross AndersonUniversity of CambridgeVerified email at cl.cam.ac.uk
Simon S. WooAssistant Professor, Sungkyunkwan University (SKKU)Verified email at g.skku.edu
Mahdi Daghmehchi FiroozjaeiAssistant Professor, University of WindsorVerified email at uwindsor.ca
Konstantin BeznosovUniversity of British ColumbiaVerified email at ece.ubc.ca
Jihyeon RyuKwangwoon University, Assistant ProfessorVerified email at security.re.kr
Eiko YonekiComputer Laboratory, University of CambridgeVerified email at cl.cam.ac.uk
Jaehoon (Paul) JeongSungkyunkwan University, Department of Computer Science and Engineering, Associate ProfessorVerified email at skku.edu
Youngbae SongKorea Institute of Energy ResearchVerified email at kier.re.kr
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Eunsoo KimSungkyunkwan UniversityVerified email at skku.edu
Seongyeol OhJunior Technician, Cyber Security Team, Korea Atomic Energy Research InstituteVerified email at kaeri.re.kr