Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
Nickolaos KoroniotisCyber Security Lecturer, UNSW Canberra CityVerified email at ad.unsw.edu.au
Muna Al-HawawrehLecturer (Assistant Professor)-Deakin UniversityVerified email at deakin.edu.au
Benjamin TurnbullUniversity of New South WalesVerified email at unsw.edu.au
Keith F. JoinerSenior Lecturer Test and Evaluation, University of NSW, CanberraVerified email at adfa.edu.au
Suhaila IsmailSenior Lecturer, National Defense University MalaysiaVerified email at upnm.edu.my
Rayford VaughnUniversity of Alabama in HuntsvilleVerified email at uah.edu
Tim FerrisCranfield UniversityVerified email at cranfield.ac.uk
Dhenesh V SubramanianLecturer in Computing sciences, University of South PacificVerified email at usp.ac.fj
Stephen CookProfessor of Defence Systems, University of AdelaideVerified email at adelaide.edu.au
Thomas (Tommy) H. MorrisUniversity of Alabama in HuntsvilleVerified email at uah.edu
Marwa KeshkUniversity of New South Wales/ Data61, CSIRO
Follow![Elena Sitnikova](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=sBylo-4AAAAJ&citpid=2)