Get my own profile
Public access
View all16 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Jemal AbawajyFull Professor, Deakin University, AustraliaVerified email at deakin.edu.au
- Herbert F JelinekDepartment of Medical Sciences, Khalifa University, Abu DhabiVerified email at ku.ac.ae
- Morshed U.ChowdhurySenior Lecturer, School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Stephen QuinnAssociate Professor, Swinburne University of TechnologyVerified email at swin.edu.au
- Andrew StranieriFederation University Australia, VictoriaVerified email at federation.edu.au
- Xuechao YangCollege of ABLE&IT, Victoria UniversityVerified email at vu.edu.au
- Joe RyanUniversity of NewcastleVerified email at newcastle.edu.au
- Byeong Ho KangProfessor, University of TasmaniaVerified email at utas.edu.au
- Fengling HanSchool of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
- Richard DazeleyProfessor of Artificial Intelligence and Machine Learning, School of Information Technology, DeakinVerified email at deakin.edu.au
- Peter VamplewProfessor, Information Technology, Federation University AustraliaVerified email at federation.edu.au
- Gleb BeliakovDeakin UniversityVerified email at deakin.edu.au
- Jilyana Cazaranstay-at-home mother, formerly Louisiana State UniversityVerified email at math.lsu.edu
- David CornforthIndependent ScholarVerified email at ncis.org
- Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
- Leanne RylandsWestern Sydney University, AustraliaVerified email at westernsydney.edu.au
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Sorin DascalescuUniversitatea din BucurestiVerified email at fmi.unibuc.ro
- Mirka MillerUniversity of Newcastle, Australia & University of West Bohemia, Czech RepublicVerified email at newcastle.edu.au