Get my own profile
Public access
View all19 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Bok-Min GoiProfessor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
John SeeAssociate Professor, Heriot-Watt University MalaysiaVerified email at hw.ac.uk
KokSheik WongMonash University MalaysiaVerified email at monash.edu
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Huo-Chong LingResearcher@Curtin University Sarawak MalaysiaVerified email at curtin.edu.my
Willi MeierFHNWVerified email at fhnw.ch
LIONG SZE TENGFENG CHIA UNIVERSITYVerified email at mail.fcu.edu.tw
Yoga RahulamathavanLoughborough University London, UKVerified email at lboro.ac.uk
Wai Kong LeeGachon UniversityVerified email at gachon.ac.kr
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Glenford MappAssociate Professor, Middlesex UniversityVerified email at mdx.ac.uk
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Ji-Jian ChinMultimedia UniversityVerified email at mmu.edu.my
Mahdi AiashMiddlesex UniversityVerified email at mdx.ac.uk
Jonathon A ChambersEmeritus Professor, University of LeicesterVerified email at le.ac.uk
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
Vishnu Monn BaskaranSchool of Information Technology, Monash University, Malaysia.Verified email at monash.edu
Yandan WangLecturer of Wenzhou UniversityVerified email at wzu.edu.cn