Get my own profile
Co-authors
- M. Ali BabarProfessor of Software Engineering, The University of Adelaide, AustraliaVerified email at adelaide.edu.au
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Roland CroftPhD Student, University of AdelaideVerified email at adelaide.edu.au
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
- Kristen MooreCSIRO's Data61Verified email at data61.csiro.au
- Zahra MousaviUniversity of AdelaideVerified email at adelaide.edu.au
- Leonie SimpsonAssociate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIAVerified email at qut.edu.au
- Matthew McKagueSchool of Computer Science, Queensland University of TechnologyVerified email at qut.edu.au
- Fida HasanUniversity of New South Wales (UNSW) | QUT | RMIT | USCVerified email at unsw.edu.au
- Anjitha SreekumarSchool of Computer and Mathematical Sciences, University of AdelaideVerified email at adelaide.edu.au
- Ziaur RahmanAssociate Professor, Department of ICT, MBSTUVerified email at mbstu.ac.bd
Follow
Chadni Islam
Lecturer, Queensland University of Technology (QUT)
Verified email at qut.edu.au - Homepage