Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaVerified email at swin.edu.au
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
- Mohammad Ali MoniThe University of Cambridge; Oxford University; University of Queensland; Charles Sturt UniversityVerified email at csu.edu.au
- Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityVerified email at napier.ac.uk
- Mohamed Amine Ferrag, PhD, SIEEEAssociate Professor of AI & Cybersecurity, Guelma UniversityVerified email at univ-guelma.dz
- M. Ali Akber DewanAssociate Professor, School of Computing and Information Systems, Athabasca University, CanadaVerified email at athabascau.ca
- Hayden WimmerProfessorVerified email at georgiasouthern.edu
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
- Asif Qumer GillProfessor, Faculty of Engineering and IT, University of Technology SydneyVerified email at uts.edu.au
- Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au