Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au
Der-Jiunn DengNational Changhua University of EducationVerified email at cc.ncue.edu.tw
Cheng-Han Lin國立成功大學電機系博士Verified email at ee.ncku.edu.tw
Yueh Min HuangNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Artur ZivianiNational Laboratory for Scientific Computing (LNCC), BrazilVerified email at lncc.br
Chen Hsiao-HwaNational Cheng Kung UniversityVerified email at mail.ncku.edu.tw
Rafidah Md NoorProfessor, University of Malaya, Kuala LumpurVerified email at um.edu.my
Kayhan Zrar GhafoorDepartment of Information and Communication Technology Eng., Erbil Polytechnic University, Iraq.Verified email at epu.edu.iq
Rashid Hafeez KhokharLecturer of Computer Science, Charles Sturt UniversityVerified email at csu.edu.au
Jen-Wen DingNational Kaohsiung University of Applied SciencesVerified email at kuas.edu.tw
Bin LiAssociate Professor, School of Electrical Engineering and Computer Science, Penn State UniversityVerified email at psu.edu
Han-Chieh ChaoChair Professor of Applied Informatics , Fo Guang UniversityVerified email at fgu.edu.tw
Morris ChangUniversity of South Florida