Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Josef PieprzykCSIRO Data61Verified email at csiro.au
Leonie SimpsonSenior Lecturer, Science and Engineering Faculty, Queensland University of TechnologyVerified email at qut.edu.au
Edward DawsonEmeritus Professor Queensland University of TechnologyVerified email at qut.edu.au
Wei-Chuen YauXiamen University MalaysiaVerified email at xmu.edu.my
Raphaël C.-W. PhanProfessor at Monash UniversityVerified email at monash.edu
Pardeep kumarSwansea UniversityVerified email at swansea.ac.uk
Madhusudan SinghOregon Institute Technology (Oregon Tech)/Woosong UniversityVerified email at oit.edu
Swee-Huay HengMultimedia UniversityVerified email at mmu.edu.my
Wun-She YapUniversiti Tunku Abdul RahmanVerified email at utar.edu.my
Ji-Jian ChinUniversity of PlymouthVerified email at plymouth.ac.uk
Huo-Chong LingResearcher@RMIT University VietnamVerified email at rmit.edu.vn
Syh Yuan TanNewcastle UniversityVerified email at newcastle.ac.uk
Geong Sen PohCyber Security AI R & DVerified email at ntu.edu.sg
Kamran Siddique, SMIEEEDepartment of Computer Science and Engineering, University of Alaska, USAVerified email at alaska.edu
Muammer TürkoğluSamsun ÜniversitesiVerified email at samsun.edu.tr
Abdulkadir SengurFirat UniversityVerified email at firat.edu.tr
Janaka AlawatugodaRabdan Academy, Abu Dhabi, UAE; Griffith University, Brisbane, AustraliaVerified email at ra.ac.ae
Kelvin J. A. OoiXiamen University MalaysiaVerified email at xmu.edu.my
Lee HoonJaeProf. of Dept. Information Security, Dongseo Univ.Verified email at dongseo.ac.kr
Mohammad Arif Sobhan BhuiyanXiamen University MalaysiaVerified email at xmu.edu.my