Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- David M W PowersProfessor of Computer and Cognitive Science, College of Science and Engineering, Flinders UniversityVerified email at flinders.edu.au
- Jon WhittleCSIRO's Data61Verified email at data61.csiro.au
- Harsha PereraPostdoctoral Research Fellow, CSIRO, AustraliaVerified email at csiro.au
- Rifat Ara ShamsPostdoctoral Research Fellow, CSIRO's Data61Verified email at csiro.au
- Simon EvansUniversity of Surrey, UKVerified email at sussex.ac.uk
- Mahdi FahmidehSenior Lecturer (Assistant Professor) in Cyber Security at University of Southern QueenslandVerified email at usq.edu.au
- Aditya GhoseProfessor of Computer Science, University of WollongongVerified email at uow.edu.au
- Jun YanUniversity of WollongongVerified email at uow.edu.au
- Jun ShenUniversity of WollongongVerified email at uow.edu.au
- Aakash AhmadAssistant Professor - Lancaster University Leipzig, GermanyVerified email at lancaster.ac.uk
- Arif NurwidyantoroAssistant Professor, Department of Computer Science and Electronics, Universitas Gadjah MadaVerified email at ugm.ac.id
- Moein AlmasiUniversity of ManitobaVerified email at cs.umanitoba.ca
- Jaime Simão SichmanFull Professor, University of São Paulo, BrazilVerified email at usp.br
- Amanul HaqueNorth Carolina State UniversityVerified email at ncsu.edu
- Gillian OliverMonash UniversityVerified email at monash.edu
- Asghar MoeiniThe University of MelbourneVerified email at unimelb.edu.au
- Francisco Braulio OliveiraMSc Candidate, Universidade de São PauloVerified email at usp.br
- Wan Nurhayati Wan Ab RahmanUniversiti Putra MalaysiaVerified email at upm.edu.my
- Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
- John C. GrundyAustralian Laureate Fellow and Professor of Software Engineering, Faculty of IT, Monash UniversityVerified email at monash.edu