Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Ermyas AbebeVerified email at consensys.net
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
- Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
- Anton BeloglazovSoftware Engineer at GoogleVerified email at google.com
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
- Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
- Xu ZhongOracleVerified email at oracle.com
- Chandra ThapaCSIRO Data61Verified email at data61.csiro.au
- Yifeng ZhengHarbin Institute of TechnologyVerified email at hit.edu.cn
- Sartaj SahniDistinguished Professor of Computer Science, University of FloridaVerified email at cise.ufl.edu
- Dr Nour MoustafaUniversity of New South Wales (UNSW Canberra)Verified email at ieee.org
- Geoff LeachAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au