Get my own profile
Public access
View all11 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Mohammed AtiquzzamanHitachi Chair, Presidential Professor of Computer Science, University of OklahomaVerified email at ou.edu
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Abdur Rahman Bin Shahid, Ph.D.Assistant Professor and Director of SHIELD Lab, Southern Illinois University CarbondaleVerified email at cs.siu.edu
- Dr. Hasan sarwarUnited International UniversityVerified email at cse.uiu.ac.bd
- Andrei KelarevRMIT UniversityVerified email at rmit.edu.au
- tan kim geokFaculty of Engineering & TechnologyVerified email at mmu.edu.my
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
- Norrima MokhtarLecturer, University of MalayaVerified email at um.edu.my
- Zuwairie IbrahimUniversiti Malaysia PahangVerified email at ump.edu.my
- Afaz Uddin AhmedPhDVerified email at uqconnect.edu.au
- Fayeem AzizResearch and Development Engineer, SANDVIKVerified email at restech.net.au