Get my own profile
Public access
View all55 articles
21 articles
available
not available
Based on funding mandates
Co-authors
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Hossein GhodosiSenior Lecturer, College of Business, Law and Governance, James Cook UniversityVerified email at jcu.edu.au
Paweł MorawieckiPolish Academy of SciencesVerified email at ipipan.waw.pl
Mehmet A. OrgunSchool of Computing, Macquarie UniversityVerified email at mq.edu.au
Leonie SimpsonAssociate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIAVerified email at qut.edu.au
Yuliang ZhengProfessor & Chair, Computer Science, University of Alabama at BirminghamVerified email at uab.edu
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Babak SadeghiyanAssociate Professor of Computer Engineering, Amirkabir University of Technology (Tehran Polytechnic)Verified email at aut.ac.ir
Nicolas T. CourtoisQualcomm Sophia AntipolisVerified email at bettercrypto.com
Hassan Jameel AsgharMacquarie UniversityVerified email at mq.edu.au
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Stephen McCombieNHL Stenden University of Applied ScienceVerified email at nhlstenden.com
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
Iftekhar SalamXiamen University MalaysiaVerified email at xmu.edu.my
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk