Get my own profile
Co-authors
- Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Seonghoon JeongPostdoctoral Researcher, BK21FOUR R&E Center for Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Junseok KimHyundai Motor CompanyVerified email at hyundai.com
- Faisal Abdulaziz AlfouzanGlasgow Caledonian UniversityVerified email at gcu.ac.uk
- Ho Kyun OhKorea UniversityVerified email at korea.ac.kr
- Suhyeon LeeKorea UniversityVerified email at korea.ac.kr
- Sundaresan RamachandranNaif Arab University for Security SciencesVerified email at nauss.edu.sa
- Jihoon KimVerified email at korea.ac.kr
- Jihun SonSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- K.H.KimKorea UniversityVerified email at korea.ac.kr
- Tanveer ZiaProfessor of Computer Science, University of Notre Dame AustraliaVerified email at nd.edu.au
- Hyun Jung LeekoscomVerified email at korea.ac.kr
- Dr. Nouf AlzahraniVerified email at bu.edu.sa
- Dr. Digvijaysinh M. RathodAssociate Professor and Associate Dean, National Forensic Sciences UniversityVerified email at nfsu.ac.in
- Abhinav ShahNational Forensic Sciences UniversityVerified email at nfsu.ac.in
- 이상진고려대 정보보호대학원Verified email at korea.ac.kr
- Sangjin LeeDFRC, ICSP, School of Cyber Security, Korea Univ.Verified email at korea.ac.kr