Get my own profile
Public access
View all56 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
Charith PereraCardiff University, UKVerified email at acm.org
Arkady ZaslavskyDeakin University, Data61 @ CSIRO, Monash University, Lulea University of Technology(Sweden)Verified email at deakin.edu.au
Thilina RanbadugeAustralian National University and Data 61, CSIROVerified email at anu.edu.au
Dimitrios GeorgakopoulosSwinburne University of TechnologyVerified email at swin.edu.au
Tim ChurchesUNSW Australia, Faculty of MedicineVerified email at unsw.edu.au
Vassilios VerykiosHellenic Open University, GREECEVerified email at eap.gr
Markus HeglandThe Australian National UniversityVerified email at anu.edu.au
Erhard RahmProfessor of Computer Science, University of LeipzigVerified email at informatik.uni-leipzig.de
Ross W GaylerIndependent ResearcherVerified email at rossgayler.com
Stephen G RobertsMathematics, Australian National UniversityVerified email at anu.edu.au
Khoi-Nguyen TranResearch Software Engineer, IBM Almaden Research CenterVerified email at ibm.com
Graham WilliamsAustralian National UniversityVerified email at togaware.com
Rainer SchnellUniversität Duisburg-EssenVerified email at uni-due.de
Minkyoung KimAssistant Professor of Big Data Analytics, Kyung Hee University, Seoul, KoreaVerified email at khu.ac.kr
Michael ComptonCSIROVerified email at csiro.au
Prem Prakash JayaramanSwinburne University of TechnologyVerified email at swinburne.edu.au
David NewthCommonwealth Scientific and Industrial Research OrganizationVerified email at csiro.au
Lexing XieAustralian National UniversityVerified email at anu.edu.au
Anushka VidanageResearch Fellow, Software Innovation Institute, The Australian National UniversityVerified email at anu.edu.au
Follow