Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Ermyas AbebeVerified email at consensys.net
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Anton BeloglazovSoftware Engineer at GoogleVerified email at google.com
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Xu ZhongOracleVerified email at oracle.com
Chandra ThapaCSIRO Data61Verified email at data61.csiro.au
Yifeng ZhengThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Sartaj SahniDistinguished Professor of Computer Science, University of FloridaVerified email at cise.ufl.edu
Dr Nour MoustafaUniversity of New South Wales (UNSW Canberra)Verified email at ieee.org
Geoff LeachAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au