Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Kenichi MatsumotoNAISTVerified email at is.naist.jp
- Raula Gaikovina KulaProfessor, Osaka UniversityVerified email at ist.osaka-u.ac.jp
- Takashi IshioFuture University HakodateVerified email at fun.ac.jp
- Akinori IharaAssociate Professor, Wakayama UniversityVerified email at wakayama-u.ac.jp
- Arnon RungsawangDept. of Computer Engineering, Kasetsart UniversityVerified email at ku.ac.th
- Supatsara WattanakriengkraiNara Institute of Science and TechnologyVerified email at is.naist.jp
- Bundit ManaskasemsakDepartment of Computer Engineering, Faculty of Engineering, Kasetsart UniversityVerified email at mikelab.net
- Shane McIntoshSoftware REBELs @ University of WaterlooVerified email at uwaterloo.ca
- Antonino SabettaSAP Security ResearchVerified email at sap.com
- Henrik PlateSecurity Researcher, Endor LabsVerified email at endor.ai
- Serena Elisa PontaSAP Security ResearchVerified email at sap.com
- Passakorn PhannachittaCollege of Arts, Media and TechnologyVerified email at cmu.ac.th
- Naoyasu UbayashiProfessor, Waseda UniversityVerified email at acm.org
- Yasutaka KameiProfessor, Kyushu University, InaRIS FellowVerified email at ait.kyushu-u.ac.jp
Follow
Bodin Chinthanet
Software Engineering Laboratory, Nara Institute of Science and Technology
Verified email at is.naist.jp - Homepage