Get my own profile
Public access
View all10 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Seyit A. CamtepeCSIRO Data61, Cyber Security Automation and OrchestrationVerified email at ieee.org
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Lichao "James" SunLehigh UniversityVerified email at lehigh.edu
Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
Lawrence OngAssociate Professor, The University of NewcastleVerified email at newcastle.edu.au
Sarah J JohnsonProfessor, The University of Newcastle, AustraliaVerified email at newcastle.edu.au
Josef PieprzykCSIRO Data61Verified email at csiro.au
Feng XiaIEEE Fellow, Professor, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Kallol Krishna KarmakarLecturer in Cybersecurity (TNE), Deakin UniversityVerified email at deakin.edu.au
Amin SakzadAssociate Professor, Faculty of Information Technology, Monash UniversityVerified email at monash.edu
Alberto Huertas CeldranUniversity of MurciaVerified email at um.es
Dan Dongseong KimThe University of Queensland (UQ), Deputy Director, UQ CybersecurityVerified email at uq.edu.au
salil kanhereFIEEE, Professor, UNSW Sydney, AustraliaVerified email at unsw.edu.au