Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dan Dongseong KIMDeputy Director, UQ Cybersecurity; Associate Professor, The University of QueenslandVerified email at uq.edu.au
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
Hooman AlavizadehLecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe UniversityVerified email at latrobe.edu.au
Arash Habibi LashkariCanada Research Chair and Associate Professor in Cybersecurity @ York UniversityVerified email at yorku.ca
Simon Yusuf EnochVerified email at uq.edu.au
HongXiang GengUniversity of TorontoVerified email at mail.utoronto.ca
Alberto Leon GarciaUniversity of TorontoVerified email at utoronto.ca
Nikhill VombatkereGraduate Student, University of CalgaryVerified email at ucalgary.ca
Sepideh NiktabeMaster Student,York UniversityVerified email at yorku.ca
Nasim Beigi-MohammadiPostdoctoral fellow, University of TorontoVerified email at utoronto.ca
Mona ParizadehPostdoctoral AssociateVerified email at ucalgary.ca
Duc-Phong LeFintech Technical Researcher (Cryptographer), Bank of CanadaVerified email at bankofcanada.ca
Masoud ErfaniPwC Canada - University of New BrunswickVerified email at unb.ca
Ali A. GhorbaniProfessor and Canada Research Chair in CybersecurityVerified email at unb.ca
Barjinder kaurEvaluation Officer, Horizon Health NetworkVerified email at horizonnb.ca
Farzaneh ShoelehVerafin Inc.Verified email at nasdaq.com