Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaVerified email at swin.edu.au
- Professor Ashad Kabir, Ph.DProfessor and Deputy Leader of Data Mining Research, Charles Sturt UniversityVerified email at csu.edu.au
- Iqbal H Sarker, PhDCUET | Swinburne University | University of Technology Sydney | Cyber Security CRC | ECU, AustraliaVerified email at ecu.edu.au
- Malinda KapurugePostdoctoral research fellow at Swinburne University of TechnologyVerified email at swin.edu.au
- Jian YuAuckland University of TechnologyVerified email at aut.ac.nz
- Liuping WangProfessor of Control Engineering, RMIT UniversityVerified email at rmit.edu.au
- Mahmoud HusseinMenoufia University, Faculty of Computers and InformationVerified email at ci.menofia.edu.eg
- A. S. M. KayesSenior Lecturer in Cybersecurity, Dept of CSIT at La Trobe University, MelbourneVerified email at latrobe.edu.au
- Indika Priyantha Kumara Weerasingha...Assistant Professor, Tilburg University - Jheronimus Academy of Data ScienceVerified email at tilburguniversity.edu
- Lars GrunskeProfessor for Software Engineering, Humboldt-Universität zu Berlin, GermanyVerified email at informatik.hu-berlin.de
- Ayman A. AminAssociate Professor of Statistics, Menoufia UniversityVerified email at commerce.menofia.edu.eg
- Tuan NguyenSwinburne University of TechnologyVerified email at swin.edu.au
- Mohan Baruwal ChhetriPrincipal Research Scientist, CSIRO, AustraliaVerified email at data61.csiro.au
- Ron AddieAssociate Professor of Computer Science, University of Southern QueenslandVerified email at usq.edu.au
- Ryszard KowalczykSmartSat CRC Professorial Chair in Artificial IntelligenceVerified email at unisa.edu.au