Get my own profile
Public access
View all39 articles
19 articles
available
not available
Based on funding mandates
Co-authors
Yan WangProfessor, School of Computing, Macquarie University, Sydney, AustraliaVerified email at mq.edu.au
Rajan ShankaranMacquarie University, AustraliaVerified email at mq.edu.au
Guanfeng LiuMacquarie UniversityVerified email at mq.edu.au
Kashif Saleem (ORCID:0000-0001-80...Center of Excellence in Information Assurance, King Saud UniversityVerified email at ksu.edu.sa
Rolf SchwitterMacquarie UniversityVerified email at mq.edu.au
Josef PieprzykCSIRO Data61Verified email at csiro.au
Shuchao PangUniversity of New South WalesVerified email at students.mq.edu.au
"Abdelouahid Derhab"Professor of Cybersecurity, King Saud UniversityVerified email at ksu.edu.sa
Abhaya NayakMacquarie UniversityVerified email at mq.edu.au
Hausi A. MüllerDepartment of Computer Science, Faculty of Engineering, University of Victoria, IEEE Quantum WeekVerified email at cs.uvic.ca
Abdul SattarProfessor of Computer Science, Griffith UniversityVerified email at griffith.edu.au
Bill WadgeProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
Lie QuMacquarie UniversityVerified email at students.mq.edu.au
Scott TilleyProfessor, Florida Institute of TechnologyVerified email at cs.fit.edu
Vijay VaradharajanThe University if NewcastleVerified email at newcastle.edu.au
Haider Abbas, IET FellowProfessor (Tenured) of Cybersecurity @ National University of Sciences and Technology, PakistanVerified email at mcs.edu.pk
Ee-Peng LimSingapore Management UniversityVerified email at smu.edu.sg
Graham WilliamsAustralian National UniversityVerified email at togaware.com
Mahmud HasanDepartment of Computing, Macquarie UniversityVerified email at iut-dhaka.edu
Li Qiao (ORCID:0000-0003-1038-936...University of New South WalesVerified email at adfa.edu.au
Follow
