Get my own profile
Public access
View all0 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
- Elena SitnikovaAssociate Professor, Flinders UniversityVerified email at flinders.edu.au
- Benjamin TurnbullUniversity of New South WalesVerified email at unsw.edu.au
- Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
- Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
- Timothy LynarUniversity of New South WalesVerified email at adfa.edu.au
- Hussein A. AbbassFellow IEEE, Founding-Editor-in-Chief, IEEE Trans on AI, Professor, University of New South WalesVerified email at adfa.edu.au