Get my own profile
Public access
View all5 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Dr Nour MoustafaUniversity of New South Wales (UNSW Canberra)Verified email at ieee.org
- Nickolaos KoroniotisCyber Security Lecturer, UNSW Canberra CityVerified email at ad.unsw.edu.au
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
- David OrmrodUniSAVerified email at unisa.edu.au
- Theresa SobbAdjunct Associate Lecturer, University of New South WalesVerified email at adfa.edu.au
- Sara SalimResearch Associate at UNSW, CanberraVerified email at unsw.edu.au
- Nathan JohnsonVerified email at asu.edu
- Martin ReissleinProfessor, School of Electrical, Computer, and Energy Eng., Arizona State UniversityVerified email at asu.edu
- Daniel ClarkUNSW CanberraVerified email at student.adfa.edu.au
- Matthew WarrenRMIT UniversityVerified email at rmit.edu.au
- Simon TjoaSt. Poelten University of Applied SciencesVerified email at fhstp.ac.at
- Alex MurrayUbuntu Security Tech Lead at CanonicalVerified email at canonical.com
- Marwa KeshkUniversity of New South Wales/ Data61, CSIRO