Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Dr Nour MoustafaUniversity of New South Wales (UNSW Canberra)Verified email at ieee.org
- Nickolaos KoroniotisCyber Security Lecturer, UNSW Canberra CityVerified email at ad.unsw.edu.au
- Muna Al-HawawrehLecturer (Assistant Professor)-Deakin UniversityVerified email at deakin.edu.au
- Benjamin TurnbullUniversity of New South WalesVerified email at unsw.edu.au
- Keith F. JoinerSenior Lecturer Test and Evaluation, University of NSW, CanberraVerified email at adfa.edu.au
- Suhaila IsmailSenior Lecturer, National Defense University MalaysiaVerified email at upnm.edu.my
- Rayford VaughnUniversity of Alabama in HuntsvilleVerified email at uah.edu
- Tim FerrisCranfield UniversityVerified email at cranfield.ac.uk
- Dhenesh V SubramanianLecturer in Computing sciences, University of South PacificVerified email at usp.ac.fj
- Stephen CookProfessor of Defence Systems, University of AdelaideVerified email at adelaide.edu.au
- Thomas (Tommy) H. MorrisUniversity of Alabama in HuntsvilleVerified email at uah.edu
- Marwa KeshkUniversity of New South Wales/ Data61, CSIRO
Follow