Get my own profile
Public access
View all19 articles
18 articles
available
not available
Based on funding mandates
Co-authors
Anand PaulKyungpook National UniversityVerified email at knu.ac.kr
Irfan MehmoodUniversity of BradfordVerified email at bradford.ac.uk
Awais AhmadImam Muhammad Ibn Saud Islamic University, Riyadh, Kingdom of Saudi ArabiaVerified email at imamu.edu.sa
Muhammad SajjadDept. of Computer ScienceVerified email at icp.edu.pk
Khan Muhammad, PhD (Digital Conte...VIS2KNOW Lab, Department of Applied AI, Sungkyunkwan University, Seoul 03063, South KoreaVerified email at skku.edu
Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au
Yunyoung NamSoonchunhyang UniversityVerified email at sch.ac.kr
Sohail Jabbar - Prof. of Computer Scie...Al Imam Muhammad Ibn Saud Islamic University, Riyadh, Saudia ArabiaVerified email at imamu.edu.sa
Daehoon KimPh.D, Korea UniversityVerified email at korea.ac.kr
Sang-Soo YeoMokwon UniversityVerified email at mokwon.ac.kr
Ahmed M. ElmiseryUniversity of South Wales, United KingdomVerified email at ntu.ac.uk
Seheon SongAjou Univ.Verified email at ajou.ac.kr
Wenny RahayuProfessor in Computer Science, La Trobe University, AustraliaVerified email at latrobe.edu.au
Uyen Trang NguyenProfessor of Computer Science, York UniversityVerified email at cse.yorku.ca
Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Follow
Seungmin Rho
Department of Industrial Security, Chung-Ang University, Korea
Verified email at cau.ac.kr - Homepage