Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Junseok KimHyundai Motor CompanyVerified email at hyundai.com
- Kyounggon KimAssistant Professor, Head of Cybercrime Division, Naif Arab University for Security SciencesVerified email at nauss.edu.sa
- Ah Reum KangPai Chai UniversityVerified email at arkang.net
- David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
- Yoo, Jeong DoKorea UniversityVerified email at korea.ac.kr
- Hyun Min SongAssistant Professor at Dankook UniversityVerified email at dankook.ac.kr
- Hwejae LeeSchool of CyberSecurity, Korea UniversityVerified email at korea.ac.kr
- Byung Il KwakAssistant Professor, Division of Software, Hallym UniversityVerified email at hallym.ac.kr
- Sangho LeeSamsung ResearchVerified email at samsung.com
- Mee Lan HanAssistant Professor, Dept. of AI Cyber Security, Korea University (Sejong)Verified email at korea.ac.kr
- Yuseung NohPh.D. student at Korea UniversityVerified email at korea.ac.kr
- Hyunjae KangPostdoctoral Researcher at School of EECS, University of QueenslandVerified email at uq.edu.au
- Minsoo RyuSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Ji Young WooSoonchunhyang UniversityVerified email at sch.ac.kr