Crea il mio profilo
Accesso pubblico
Visualizza tutto20 articoli
6 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Cliff B JonesProfessor of Computing Science, Newcastle University, UKEmail verificata su ncl.ac.uk
- Brijesh DongolUniversity of SurreyEmail verificata su surrey.ac.uk
- Colin FidgeQueensland University of TechnologyEmail verificata su qut.edu.au
- Larissa MeinickeThe University of QueenslandEmail verificata su uq.edu.au
- Mark UttingThe University of QueenslandEmail verificata su uq.edu.au
- Carroll MorganProfessor, University of New South Wales and DATA61Email verificata su unsw.edu.au
- Brendan MahonyResearch Scientist, Defence Science and Technology GroupEmail verificata su dst.defence.gov.au
- Bill Roscoe (A.W. Roscoe)Emeritus Professor of Computer Science, Oxford UniversityEmail verificata su cs.ox.ac.uk
- Alan BurnsUniversity of York, UKEmail verificata su york.ac.uk
- Georg StruthUniversity of SheffieldEmail verificata su sheffield.ac.uk
- Graeme SmithThe University of QueenslandEmail verificata su itee.uq.edu.au
- Dr Luke WildmanQueenslandEmail verificata su rgbassurance.com.au
- John DerrickUniversity of SheffieldEmail verificata su sheffield.ac.uk
- Andrew MartinProfessor of Systems Security, University of OxfordEmail verificata su cs.ox.ac.uk
- Andrius VelykisPhD Student, Newcastle UniversityEmail verificata su newcastle.ac.uk
- John S. FitzgeraldNewcastle University, UKEmail verificata su ncl.ac.uk
- Colin MillerchipEmail verificata su millerchip.org
- Nigel WardQueensland Cyber Infrastructure FoundationEmail verificata su qcif.edu.au
- Chenyi ZhangOracle Labs AustraliaEmail verificata su oracle.com
- Eban EscottPh.D, University of Queensland, School of Information Technology and ElectricalEmail verificata su uqconnect.edu.au
Segui
Ian James Hayes
Professor of Software Engineering, The University of Queensland
Email verificata su uq.edu.au