Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Dr Nour MoustafaUniversity of New South Wales (UNSW Canberra)Verified email at ieee.org
Nickolaos KoroniotisCyber Security Lecturer, UNSW Canberra CityVerified email at ad.unsw.edu.au
Benjamin TurnbullUniversity of New South WalesVerified email at unsw.edu.au
Muna Al-HawawrehLecturer (Assistant Professor)-Deakin UniversityVerified email at deakin.edu.au
Keith F. JoinerSenior Lecturer Test and Evaluation, University of NSW, CanberraVerified email at adfa.edu.au
Suhaila IsmailSenior Lecturer, National Defense University MalaysiaVerified email at upnm.edu.my
Rayford VaughnUniversity of Alabama in HuntsvilleVerified email at uah.edu
Tim FerrisCranfield UniversityVerified email at cranfield.ac.uk
Dhenesh V SubramanianLecturer in Computing sciences, University of South PacificVerified email at usp.ac.fj
Stephen CookProfessor of Defence Systems, University of AdelaideVerified email at adelaide.edu.au
Thomas (Tommy) H. MorrisUniversity of Alabama in HuntsvilleVerified email at uah.edu
Marwa KeshkUniversity of New South Wales/ Data61, CSIRO
Follow