Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Lichao "James" SunAssistant Professor of Computer Science, Lehigh UniversityVerified email at lehigh.edu
- Lawrence OngAssociate Professor, The University of NewcastleVerified email at newcastle.edu.au
- Hyoungshick KimSungkyunkwan UniversityVerified email at skku.edu
- Sarah J JohnsonProfessor, The University of Newcastle, AustraliaVerified email at newcastle.edu.au
- Josef PieprzykCSIRO Data61Verified email at csiro.au
- Feng XiaProfessor, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Kallol Krishna KarmakarLecturer in Cybersecurity (TNE), Deakin UniversityVerified email at deakin.edu.au
- Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
- Amin SakzadAssociate Professor, Faculty of Information Technology, Monash UniversityVerified email at monash.edu
- Alberto Huertas CeldranUniversity of ZurichVerified email at ifi.uzh.ch
- Dan Dongseong KIMAssociate Professor (softly equivalent to a Full Professor in the US), The University of QueenslandVerified email at uq.edu.au
- salil kanhereProfessor, UNSW Sydney, AustraliaVerified email at unsw.edu.au