Get my own profile
Co-authors
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Hossein GhodosiSenior Lecturer, College of Business, Law and Governance, James Cook UniversityVerified email at jcu.edu.au
Mehmet A. OrgunDepartment of Computing, Macquarie UniversityVerified email at mq.edu.au
Yuliang ZhengProfessor & Chair, Computer Science, University of Alabama at BirminghamVerified email at uab.edu
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Paweł MorawieckiPolish Academy of SciencesVerified email at ipipan.waw.pl
Nicolas T. CourtoisUniversity College LondonVerified email at cs.ucl.ac.uk
Babak SadeghiyanAssociate Professor of Computer Engineering, Amirkabir University of Technology (Tehran Polytechnic)Verified email at aut.ac.ir
Hassan Jameel AsgharMacquarie University & Data61, CSIROVerified email at data61.csiro.au
Scott ContiniVerified email at cocoondata.com
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
Willy SusiloProfessor of Computer Science and IEEE Fellow, University of WollongongVerified email at uow.edu.au
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Stephen McCombieDepartment of Security Studies and Criminology, Macquarie UniversityVerified email at mq.edu.au
Professor Paul WattersMacquarie UniversityVerified email at mq.edu.au
Kang Leng ChiewUniversiti Malaysia SarawakVerified email at unimas.my
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk