Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Nickolaos KoroniotisCyber Security Lecturer, UNSW Canberra CityVerified email at ad.unsw.edu.au
- Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
- David OrmrodUniSAVerified email at unisa.edu.au
- Theresa SobbAdjunct Associate Lecturer, University of New South WalesVerified email at adfa.edu.au
- Sara SalimResearch Associate at UNSW, CanberraVerified email at unsw.edu.au
- Nathan JohnsonVerified email at asu.edu
- Martin ReissleinProfessor, School of Electrical, Computer, and Energy Eng., Arizona State UniversityVerified email at asu.edu
- Eoghan CaseyUniversity of LausanneVerified email at unil.ch
- Daniel ClarkUNSW CanberraVerified email at student.adfa.edu.au
- Matthew WarrenRMIT UniversityVerified email at rmit.edu.au
- Simon TjoaSt. Poelten University of Applied SciencesVerified email at fhstp.ac.at
- Alex MurrayUbuntu Security Tech Lead at CanonicalVerified email at canonical.com
- Marwa KeshkUniversity of New South Wales/ Data61, CSIRO