Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Huy Kang KimSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Ah Reum KangPai Chai UniversityVerified email at arkang.net
- Junseok KimHyundai Motor CompanyVerified email at hyundai.com
- Dr. Kyounggon KimAssistant Professor, Head of Cybercrime Division, Naif Arab University for Security SciencesVerified email at nauss.edu.sa
- David MohaisenProfessor of Computer Science, University of Central FloridaVerified email at ucf.edu
- Hyun Min SongAssistant Professor at Dankook UniversityVerified email at dankook.ac.kr
- Yuseung NohPh.D. student at Korea UniversityVerified email at korea.ac.kr
- Minsoo RyuSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Hyunjae KangSchool of Cybersecurity, Korea UniversityVerified email at korea.ac.kr
- Sangho LeeSamsung ResearchVerified email at samsung.com
- Hwejae LeeSchool of CyberSecurity, Korea UniversityVerified email at korea.ac.kr
- Mee Lan HanAssistant Professor, Dept. of AI Cyber Security, Korea University SejongVerified email at korea.ac.kr
- Byung Il KwakAssistant Professor, Division of Software, Hallym UniversityVerified email at hallym.ac.kr
- Ji Young WooSoonchunhyang UniversityVerified email at sch.ac.kr
Follow
Seonghoon Jeong
Other names정 성훈
Postdoctoral Researcher, BK21FOUR R&E Center for Cybersecurity, Korea University
Verified email at korea.ac.kr - Homepage