Get my own profile
Public access
View all22 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Bok-Min GoiProfessor of Lee Kong Chian Faculty of Engineering and Science, Universiti Tunku Abdul RahmanVerified email at utar.edu.my
John SeeAssociate Professor, Heriot-Watt University MalaysiaVerified email at hw.ac.uk
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
KokSheik WongMonash University MalaysiaVerified email at monash.edu
Jean-Philippe AumassonKudelski SecurityVerified email at kudelskisecurity.com
Huo-Chong LingResearcher@Curtin University Sarawak MalaysiaVerified email at curtin.edu.my
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Willi MeierFHNWVerified email at fhnw.ch
LIONG SZE TENGFENG CHIA UNIVERSITYVerified email at mail.fcu.edu.tw
Yoga RahulamathavanLoughborough University London, UKVerified email at lboro.ac.uk
Wai Kong LeeGachon UniversityVerified email at gachon.ac.kr
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Jonathon A ChambersEmeritus Professor, University of Leicester; Int. Hon. Dean, Harbin Eng. Univ.Verified email at le.ac.uk
Glenford MappAssociate Professor, Middlesex UniversityVerified email at mdx.ac.uk
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Mahdi AiashMiddlesex UniversityVerified email at mdx.ac.uk
Ji-Jian ChinMultimedia UniversityVerified email at mmu.edu.my
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
Yandan WangLecturer of Wenzhou UniversityVerified email at wzu.edu.cn
Vishnu Monn BaskaranSchool of Information Technology, Monash University, Malaysia.Verified email at monash.edu