Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Alan W ColmanCSIRO Data61 / Swinburne University of TechnologyEmail verificata su swin.edu.au
- Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaEmail verificata su swin.edu.au
- Professor Paul WattersCyberstronomy Pty LtdEmail verificata su cyberstronomy.com
- Asif Irshad KhanKing Abdulaziz UniversityEmail verificata su kau.edu.sa
- Muhammad Nazrul IslamMilitary Institute of Science and TechnologyEmail verificata su cse.mist.ac.bd
- Mohammad Ali MoniThe University of Cambridge; Oxford University; University of Queensland; Charles Sturt UniversityEmail verificata su csu.edu.au
- Md. Rajib Hossain, PhDTigerIT: Senior Software Engineer, R&DEmail verificata su cuet.ac.bd
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityEmail verificata su cybersecuritycrc.org.au
- M. Ali Akber DewanAssociate Professor, School of Computing and Information Systems, Athabasca University, CanadaEmail verificata su athabascau.ca
- Hayden WimmerAssociate ProfessorEmail verificata su georgiasouthern.edu
- Leandros MaglarasProfessor of Cybersecurity, Edinburgh Napier UniversityEmail verificata su napier.ac.uk
- Seyit A. CamtepeCSIRO Data61Email verificata su ieee.org
- Mohamed Amine Ferrag, PhD, SIEEETeam Leader, Technology Innovation InstituteEmail verificata su ieee.org
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaEmail verificata su data61.csiro.au
- Najmul IslamFull Professor (tenured), LUTEmail verificata su lut.fi
- Surya NepalCSIRO’s Data61, AustraliaEmail verificata su csiro.au