Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
Edward DawsonEmeritus Professor Queensland University of TechnologyVerified email at qut.edu.au
Uwe DulleckQUTVerified email at qut.edu.au
Nicholas Paul SheppardSenor Lecturer of Practice in Computing, Western Sydney UniversityVerified email at westernsydney.edu.au
Nimal SkandhakumarUniversity of Sri JayewardenepuraVerified email at sjp.ac.lk
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Aditya GhoseProfessor of Computer Science, University of WollongongVerified email at uow.edu.au
Aneesh KrishnaAssociate Professor, Curtin University, AustraliaVerified email at curtin.edu.au
Robin DrogemullerQueensland University of TechnologyVerified email at qut.edu.au
aniruddha dasguptaHeritage Institute of TechnologyVerified email at heritageit.edu
Khalid AlissaAssistant professor of information security, IAUVerified email at iau.edu.sa