Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Ji Young WooSoonchunhyang UniversityVerified email at sch.ac.kr
Ah Reum KangPai Chai UniversityVerified email at arkang.net
David MohaisenProfessor, University of Central FloridaVerified email at ucf.edu
Byung Il KwakSchool of Software, Hallym UniversityVerified email at hallym.ac.kr
Hyun Min SongKorean Government-Funded Research InstituteVerified email at korea.ac.kr
Jae-wook JangKorea UniversityVerified email at korea.ac.kr
Mee Lan HanDept. of AI Cyber Security, Korea UniversityVerified email at korea.ac.kr
Seonghoon JeongSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
Eunjo LeeNCSOFTVerified email at ncsoft.com
Kyung Ho ParkLead of AI, SOCARVerified email at korea.ac.kr
Hyunjae KangSchool of Cybersecurity, Korea UniversityVerified email at hksecurity.net
Dan Dongseong KIMAssociate Professor, Cybersecurity Group, The University of Queensland, AustraliaVerified email at uq.edu.au
Kyounggon KimAssistant Professor, Naif Arab University for Security SciencesVerified email at nauss.edu.sa
Changsok YooKyung Hee University, College of Hospitality and TourismVerified email at khu.ac.kr
Hyun-chul KimDept. of Software, Sangmyung University, South KoreaVerified email at smu.ac.kr
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Taekyoung (Ted) KwonSeoul National UniversityVerified email at mmlab.snu.ac.kr
Sangchan ParkState University of New York, KoreaVerified email at sunykorea.ac.kr
Song Jin YuDivision of Shipping Management, Korea Maritime & Ocean UniversityVerified email at hhu.ac.kr
Mengmeng GeSchool of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au