Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Julian Jang-JaccardCyber-Defence Campus, armasuisse S+T, Swiss Federal Department of DefenseVerified email at ar.admin.ch
Dan Dongseong KIMDeputy Director, UQ Cybersecurity; Associate Professor, The University of QueenslandVerified email at uq.edu.au
Hootan AlavizadehWright State UniversityVerified email at wright.edu
Jin B. HongThe University of Western AustraliaVerified email at uwa.edu.au
Jin-Hee ChoComputer Science Department, Virginia TechVerified email at vt.edu
Hyuk LimKorea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Noam Ben-AsherBoston FusionVerified email at bostonfusion.com
Seunghyun YoonAssistant Professor, Korea Institute of Energy Technology (KENTECH)Verified email at kentech.ac.kr
Terrence J MooreUS Army Research LaboratoryVerified email at army.mil
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Sibghat Ullah BazaiBalochistan University of Information Technology Engineering and Management SciencesVerified email at buitms.edu.pk
Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
Harith Al-SahafSenior Lecturer, Victoria University of WellingtonVerified email at ecs.vuw.ac.nz
Ian WelchAssociate Professor, Victoria University at Wellington, New ZealandVerified email at ecs.vuw.ac.nz
Samin ArefEngineering and Data Science, University of TorontoVerified email at utoronto.ca
Nigel PhairMonash UniversityVerified email at monash.edu
Hans W. GuesgenProfessor of Computer Science, Massey University, New ZealandVerified email at massey.ac.nz
Follow
Hooman Alavizadeh
Lecturer (Assistant Professor) in Cybersecurity, Computer Science & IT, La Trobe University
Verified email at latrobe.edu.au - Homepage