Get my own profile
Co-authors
- Lee HoonJaeProf. of Dept. Information Security, Dongseo Univ.Verified email at dongseo.ac.kr
- JunHuy LamDongseo UniversityVerified email at scentales.com
- Sang-Gon LeeDongseo UniversityVerified email at dongseo.ac.kr
- Thi-Thu-Huong LeResearch Professor, Pusan National University; Hung Yen University of Technology and EducationVerified email at pusan.ac.kr
- Sandra KumiComputer Science, University of SaskatchewanVerified email at mail.usask.ca
- Aji Teguh Prihatno, S.T., M.Sc.Pusan National UniversityVerified email at pusan.ac.kr
- Resmana LimPetra Christian UniversityVerified email at petra.ac.id
- Raymond SutjiadiInstitut Informatika Indonesia SurabayaVerified email at ikado.ac.id
- Adi WibowoPetra Christian UniversityVerified email at petra.ac.id
- Friska Natalia FerdinandUniversitas Multimedia NusantaraVerified email at umn.ac.id
- Ivan Kristianto SinggihAssistant Professor, Department of Industrial Engineering, University of Surabaya (UBAYA), IndonesiaVerified email at staff.ubaya.ac.id
- Hyoeun KangPusan National UniversityVerified email at pusan.ac.kr
- Naufal SuryantoPusan National UniversityVerified email at pusan.ac.kr
- dedy septono catur putrantoPusan National University, Shizuoka University, Poltek Siber dan Sandi Negara, Badan Siber dan SandiVerified email at bssn.go.id
- Rini Wisnu WardhaniPusan National University, National Cyber and Crypto Agency.Verified email at pusan.ac.kr
- Byung-Gook LeeProfessor of Division of Computer Engineering, Dongseo UniversityVerified email at dongseo.ac.kr