Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Professor Naveen ChilamkurtiAssociate Dean and Head of Cybersecurity Discipline at La Trobe University, MelbourneVerified email at latrobe.edu.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Derek AbbottProfessor of Electrical & Electronic Engineering, University of Adelaide, AustraliaVerified email at adelaide.edu.au
Kristen MooreCSIRO's Data61Verified email at data61.csiro.au
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
Mohammed AtiquzzamanPresidential Professor of Computer Science, University of OklahomaVerified email at ou.edu
Xinghuo YuVice-Chancellors Professorial Fellow & Distinguished Professor @ RMITVerified email at rmit.edu.au
Carsten RudolphMonash University, Melbourne, AustraliaVerified email at monash.edu
Helge JanickeCyber Security Cooperative Research CentreVerified email at cybersecuritycrc.org.au
Jason (Minhui) XueSenior Research Scientist, CSIRO's Data61Verified email at data61.csiro.au