Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Alsharif (Sharif) AbuadbbaTeam Lead - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Ermyas AbebeVerified email at consensys.netSeyit A. CamtepeCSIRO Data61, Cyber Security Automation and OrchestrationVerified email at ieee.org
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Anton BeloglazovSoftware Engineer at GoogleVerified email at google.com
Chandra ThapaCSIRO Data61Verified email at data61.csiro.au
Yifeng ZhengThe Hong Kong Polytechnic UniversityVerified email at polyu.edu.hk
Xu ZhongOracleVerified email at oracle.com
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Sartaj SahniDistinguished Professor of Computer Science, University of FloridaVerified email at cise.ufl.edu
Dr Nour MoustafaUniversity of New South Wales (UNSW Canberra)Verified email at unsw.edu.au
Geoff LeachAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au