Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Josef PieprzykCSIRO Data61Verified email at csiro.au
Leonie SimpsonAssociate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIAVerified email at qut.edu.au
Edward DawsonEmeritus Professor Queensland University of TechnologyVerified email at qut.edu.au
Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
Madhusudan SinghOregon Institute Technology (Oregon Tech)Verified email at oit.edu
Pardeep kumarWarwick Manufacturing Group, University of Warwick, UKVerified email at warwick.ac.uk
Janaka AlawatugodaRabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, AustraliaVerified email at ra.ac.ae
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
Kamran Siddique, SMIEEEDepartment of Computer Science and Engineering, University of Alaska, USAVerified email at alaska.edu
Muammer TürkoğluSamsun ÜniversitesiVerified email at samsun.edu.tr
Abdulkadir SengurFirat UniversityVerified email at firat.edu.tr
Mohammad Arif Sobhan BhuiyanXiamen University MalaysiaVerified email at xmu.edu.my
Kelvin J. A. OoiXiamen University MalaysiaVerified email at xmu.edu.my
Lee HoonJaeProf. of Dept. Information Security, Dongseo Univ.Verified email at dongseo.ac.kr