Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Abdelaziz BourasQatar UniversityVerified email at qu.edu.qa
- Mohammed AtiquzzamanHitachi Chair, Presidential Professor of Computer Science, University of OklahomaVerified email at ou.edu
- Mohammad Saiedur RahamanLecturer, Central Queensland University, AustraliaVerified email at cqu.edu.au
- Aditya Pribadi KalapaakingPhD Student, RMIT UniversityVerified email at student.rmit.edu.au
- Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
- Abdulatif AlabdulatifAssistant Professor - Qassim university - KSAVerified email at qu.edu.sa
- M.A.P.ChamikaraCSIROVerified email at data61.csiro.au
- Mahathir AlmashorSenior Engineer, CSIRO EnergyVerified email at csiro.au
- Hai DongSchool of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Tao GuProfessor in IoT, IEEE Fellow, AAIA Fellow, ACM Distinguished Member, Macquarie University,AustraliaVerified email at mq.edu.au
- Ashfaqur RahmanGroup Leader and Principal Research Scientist, Data61, CSIRO, Senior Member, IEEEVerified email at csiro.au
- Debajyoti KarmakerAmerican International University-Bangladesh (AIUB)Verified email at aiub.edu
Follow
Mohammad Saidur Rahman, PhD
Lecturer, Cloud Systems and Security, School of Computing Technology, RMIT University, Melbourne
Verified email at rmit.edu.au