Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaVerified email at swin.edu.au
Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
Mohammad Ali MoniThe University of Cambridge; Oxford University; University of Queensland; Charles Sturt UniversityVerified email at csu.edu.au
Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityVerified email at napier.ac.uk
Mohamed Amine Ferrag, PhD, SIEEEAssociate Professor of AI & Cybersecurity, Guelma UniversityVerified email at univ-guelma.dz
M. Ali Akber DewanAssociate Professor, School of Computing and Information Systems, Athabasca University, CanadaVerified email at athabascau.ca
Hayden WimmerProfessorVerified email at georgiasouthern.edu
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Asif Qumer GillProfessor, Faculty of Engineering and IT, University of Technology SydneyVerified email at uts.edu.au
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au