Get my own profile
Public access
View all17 articles
22 articles
available
not available
Based on funding mandates
Co-authors
Anand PaulProfessor of Data ScienceVerified email at lsuhsc.edu
Irfan MehmoodUniversity of BradfordVerified email at bradford.ac.uk
Awais AhmadImam Mohammad Ibn Saud Islamic University, Riyadh, Kingdom of Saudi ArabiaVerified email at imamu.edu.sa
Khan Muhammad, PhD, Associate Pro...VIS2KNOW Lab, Department of Applied AI, Sungkyunkwan University, Seoul 03063, South KoreaVerified email at skku.edu
Muhammad SajjadDept. of Computer ScienceVerified email at icp.edu.pk
Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au
Yunyoung NamSoonchunhyang UniversityVerified email at sch.ac.kr
Sang-Soo YeoMokwon UniversityVerified email at mokwon.ac.kr
Daehoon KimPh.D, Korea UniversityVerified email at korea.ac.kr
Ahmed M. ElmiseryLondon Metropolitan University, United KingdomVerified email at londonmet.ac.uk
Seheon SongAjou Univ.Verified email at ajou.ac.kr
Wenny RahayuProfessor in Computer Science, La Trobe University, AustraliaVerified email at latrobe.edu.au
Uyen Trang NguyenProfessor of Computer Science, York UniversityVerified email at cse.yorku.ca
Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Follow
Seungmin Rho
Department of Industrial Security, Chung-Ang University, Korea
Verified email at cau.ac.kr - Homepage