Get my own profile
Public access
View all3 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Mohammed AtiquzzamanHitachi Chair, Presidential Professor of Computer Science, University of OklahomaVerified email at ou.edu
Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
Abdulatif AlabdulatifAssociate Professor - Qassim university - KSAVerified email at qu.edu.sa
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Fengling HanSchool of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
Upeka PremaratneSenior Lecturer, Dept. of Electronic and Telecommunication Engineering, University of MoratuwaVerified email at uom.lk
Kithsiri SamarasingheSenior Lecturer, Department of Electronic & Telecommunication Engineering, University of MoratuwaVerified email at ent.mrt.ac.lk