Crea il mio profilo
Accesso pubblico
Visualizza tutto3 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowEmail verificata su ieee.org
- Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioEmail verificata su utsa.edu
- Nickolaos KoroniotisCyber Security Lecturer, UNSW Canberra CityEmail verificata su ad.unsw.edu.au
- Prof. Jiankun HuUniversity of New South Wales, CanberraEmail verificata su adfa.edu.au
- David OrmrodUniSAEmail verificata su unisa.edu.au
- Theresa SobbAdjunct Associate Lecturer, University of New South WalesEmail verificata su adfa.edu.au
- Sara SalimResearch Associate at UNSW, CanberraEmail verificata su unsw.edu.au
- Nathan JohnsonEmail verificata su asu.edu
- Martin ReissleinProfessor, School of Electrical, Computer, and Energy Eng., Arizona State UniversityEmail verificata su asu.edu
- Eoghan CaseyUniversity of LausanneEmail verificata su unil.ch
- Daniel ClarkUNSW CanberraEmail verificata su student.adfa.edu.au
- Matthew WarrenRMIT UniversityEmail verificata su rmit.edu.au
- Simon TjoaSt. Poelten University of Applied SciencesEmail verificata su fhstp.ac.at
- Alex MurrayUbuntu Security Tech Lead at CanonicalEmail verificata su canonical.com
- Marwa KeshkUniversity of New South Wales/ Data61, CSIRO