Get my own profile
Public access
View all20 articles
17 articles
available
not available
Based on funding mandates
Co-authors
- Anand PaulKyungpook National UniversityVerified email at knu.ac.kr
- Irfan MehmoodUniversity of BradfordVerified email at bradford.ac.uk
- Awais AhmadImam Mohammad Ibn Saud Islamic University, Riyadh, Kingdom of Saudi ArabiaVerified email at imamu.edu.sa
- Muhammad SajjadDept. of Computer ScienceVerified email at icp.edu.pk
- Khan Muhammad, PhD (Digital Conte...VIS2KNOW Lab, Department of Applied AI, Sungkyunkwan University, Seoul 03063, South KoreaVerified email at skku.edu
- Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au
- Yunyoung NamSoonchunhyang UniversityVerified email at sch.ac.kr
- Sohail Jabbar - Prof. of Computer Scie...Al Imam Muhammad Ibn Saud Islamic University, Riyadh, Saudia ArabiaVerified email at imamu.edu.sa
- Daehoon KimPh.D, Korea UniversityVerified email at korea.ac.kr
- Sang-Soo YeoMokwon UniversityVerified email at mokwon.ac.kr
- Seheon SongAjou Univ.Verified email at ajou.ac.kr
- Wenny RahayuProfessor in Computer Science, La Trobe University, AustraliaVerified email at latrobe.edu.au
- Uyen Trang NguyenProfessor of Computer Science, York UniversityVerified email at cse.yorku.ca
- Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Follow
Seungmin Rho
Department of Industrial Security, Chung-Ang University, Korea
Verified email at cau.ac.kr - Homepage