Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Alan W ColmanCSIRO Data61 / Swinburne University of TechnologyVerified email at swin.edu.au
Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaVerified email at swin.edu.au
Mohammad Ali MoniThe University of Cambridge; Oxford University; University of Queensland; Charles Sturt UniversityVerified email at csu.edu.au
Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityVerified email at napier.ac.uk
M. Ali Akber DewanAssociate Professor, School of Computing and Information Systems, Athabasca University, CanadaVerified email at athabascau.ca
Mohamed Amine Ferrag, PhD, SIEEETeam Leader, Technology Innovation InstituteVerified email at ieee.org
Hayden WimmerAssociate ProfessorVerified email at georgiasouthern.edu
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Asif Qumer GillProfessor, Faculty of Engineering and IT, University of Technology SydneyVerified email at uts.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au