Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Ermyas AbebeVerified email at consensys.net
Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
Seyit A. CamtepeCSIRO Data61Verified email at ieee.org
Anton BeloglazovSoftware Engineer at GoogleVerified email at google.com
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Xu ZhongOracleVerified email at oracle.com
Chandra ThapaCSIRO Data61Verified email at data61.csiro.au
Yifeng ZhengHarbin Institute of TechnologyVerified email at hit.edu.cn
Sartaj SahniDistinguished Professor of Computer Science, University of FloridaVerified email at cise.ufl.edu
Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
Geoff LeachAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au