Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David M W PowersProfessor of Computer and Cognitive Science, College of Science and Engineering, Flinders UniversityVerified email at flinders.edu.au
Jon WhittleCSIRO's Data61Verified email at data61.csiro.au
Rifat Ara ShamsPostdoctoral Research Fellow, CSIRO's Data61Verified email at csiro.au
Harsha PereraPostdoctoral Research Fellow, CSIRO, AustraliaVerified email at csiro.au
Simon EvansUniversity of Surrey, UKVerified email at sussex.ac.uk
Mahdi FahmidehSenior Lecturer in Cyber Security at University of Southern QueenslandVerified email at usq.edu.au
Aditya GhoseProfessor of Computer Science, University of WollongongVerified email at uow.edu.au
Moein AlmasiUniversity of ManitobaVerified email at cs.umanitoba.ca
Jun YanUniversity of WollongongVerified email at uow.edu.au
Jun ShenUniversity of WollongongVerified email at uow.edu.au
Aakash AhmadLancaster University LeipzigVerified email at lancaster.ac.uk
Arif NurwidyantoroAssistant Professor, Department of Computer Science and Electronics, Universitas Gadjah MadaVerified email at ugm.ac.id
Jaime Simão SichmanFull Professor, University of São Paulo, BrazilVerified email at usp.br
Amanul HaqueNorth Carolina State UniversityVerified email at ncsu.edu
Francisco Braulio OliveiraMSc Candidate, Universidade de São PauloVerified email at usp.br
Asghar MoeiniThe University of MelbourneVerified email at unimelb.edu.au
Gillian OliverMonash UniversityVerified email at monash.edu
Wan Nurhayati Wan Ab RahmanUniversiti Putra MalaysiaVerified email at upm.edu.my
John GrundyAustralian Laureate Fellow and Professor of Software Engineering, Faculty of IT, Monash UniversityVerified email at monash.edu
Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu