Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
KokSheik WongMonash University MalaysiaVerified email at monash.edu
Teh Pei LeeProfessor, School of Business, Monash University MalaysiaVerified email at monash.edu
John SeeAssociate Professor, Heriot-Watt University MalaysiaVerified email at hw.ac.uk
Vik Tor GohMultimedia UniversityVerified email at mmu.edu.my
Osamah Ibrahiem AbdullazizNational Chiao Tung UniversityVerified email at nctu.edu.tw
Adamu Muhammad BuhariSchool of Information Technology, Monash University Malaysia.Verified email at monash.edu
Ji-Jian ChinMultimedia UniversityVerified email at mmu.edu.my
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
Iftekhar SalamXiamen University MalaysiaVerified email at xmu.edu.my
Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
Choo Kan YeepSenior Lecturer, Multimedia UniversityVerified email at mmu.edu.my
Bok-Min GoiProfessor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my