Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Nalin Asanka Gamagedara Arachchila...Associate Professor in Cyber Security, School of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
Jill SlayUniversity of South Australia SmartSat Chair in CybersecurityVerified email at unisa.edu.au
Awais RashidProfessor, Department of Computer Science, University of Bristol, UKVerified email at bristol.ac.uk
M. Ali BabarProfessor of Software Engineering, The University of Adelaide, AustraliaVerified email at adelaide.edu.au
Leonardo Horn IwayaAssociate Senior Lecturer, Department of Mathematics and Computer Science, Karlstad UniversityVerified email at kau.se
Nisansa de SilvaSenior Lecturer, Department of Computer Science & Engineering, University of MoratuwaVerified email at cse.mrt.ac.lk
Gihan DiasUniversity of MoratuwaVerified email at uom.lk
Marthie GroblerPrincipal Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Erandi LakshikaUniversity of New South WalesVerified email at adfa.edu.au
Dimuthu Upeksha WannipurageResearch Software Engineer at Georgia Institute of Technology