Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
Abdun MahmoodAssociate Professor of Computer Science and IT, La Trobe University, MelbourneVerified email at latrobe.edu.au
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
HR PotaThe University of New South WalesVerified email at adfa.edu.au
Mohiuddin AhmedLecturer of Computing & Security at Edith Cowan University, IEEE Senior MemberVerified email at ecu.edu.au
Zubair BaigAssociate Professor, Cyber-Security, Deakin University, Melbourne, AustraliaVerified email at deakin.edu.au
Mark PickeringUNSW CanberraVerified email at adfa.edu.au
Nour MoustafaSenior Lecturer in Cyber Security - UNSW Canberra, IEEE Senior MemberVerified email at unsw.edu.au
Dr. Zubair ShahAssistant Professor, College of Science and Engineering, HBKU, QatarVerified email at hbku.edu.qa
Seng W. LokeProfessor in Computer Science, Deakin UniversityVerified email at deakin.edu.au
Razvan BeuranAssociate Professor, Japan Advanced Institute of Science and TechnologyVerified email at jaist.ac.jp
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Le Duy TanInternational University - VNU-HCMVerified email at hcmiu.edu.vn
Erwin AdiUniversity of New South WalesVerified email at unsw.edu.au
Shama IslamSenior Lecturer, School of Engineering, Deakin UniversityVerified email at deakin.edu.au
Javid TaheriProfessor, Karlstad University, SwedenVerified email at kau.se
Michael MaherReasoning Research InstituteVerified email at reasoning.org.au
Rafidah Md NoorProfessor, University of Malaya, Kuala LumpurVerified email at um.edu.my
Ahmed FalahEYVerified email at au.ey.com
Arash ShaghaghiSenior Lecturer, RMIT University | UNSW SydneyVerified email at rmit.edu.au
Syed W. ShahUNSW, Sydney/ Deakin UniversityVerified email at deakin.edu.au