Get my own profile
Public access
View all20 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Bok-Min GoiSenior Professor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
KokSheik WongMonash University MalaysiaVerified email at monash.edu
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
LIONG SZE TENGFENG CHIA UNIVERSITYVerified email at mail.fcu.edu.tw
Willi MeierFHNWVerified email at fhnw.ch
Chee-Ming TingAssociate Professor, Monash University. PhD (Maths - Statistics)Verified email at monash.edu
Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
Yogachandran RAHULAMATHAVANReader in Cybersecurity and Privacy, Loughborough University, UKVerified email at lboro.ac.uk
Wai Kong LeeUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Vishnu Monn BaskaranSchool of Information Technology, Monash University, Malaysia.Verified email at monash.edu
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
Jonathon A ChambersEmeritus Professor, University of LeicesterVerified email at le.ac.uk
Glenford MappAssociate Professor, Middlesex UniversityVerified email at mdx.ac.uk
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
Mahdi AiashAssociate Professor in Computer Science and Cyber SecurityVerified email at mdx.ac.uk
Yandan WangLecturer of Wenzhou UniversityVerified email at wzu.edu.cn