Get my own profile
Public access
View all6 articles
11 articles
available
not available
Based on funding mandates
Co-authors
- Prof Shui YuFIEEE, BoG of IEEE ComSoc and VTS, School of Computer Science, University of Technology SydneyVerified email at uts.edu.au
- Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
- Mohammad Reza NosouhiResearch Fellow at the School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
- Longxiang GaoProfessor, Qilu University of Technology; Adjunct Professor, University of Southern QueenslandVerified email at deakin.edu.au
- Bohao FengBeijing Jiaotong UniversityVerified email at bjtu.edu.cn
- Dinh Duc Nha NguyenAssociate Research Fellow, Deakin UniversityVerified email at deakin.edu.au
- Kallol Krishna KarmakarResearch Lecturer, ACSRC, University of NewcastleVerified email at newcastle.edu.au
- Shiva Raj PokhrelMarie Curie Fellow, SMIEEE, Deakin UniversityVerified email at deakin.edu.au
- Shigang LiuCSIRO's D61Verified email at data61.csiro.au
- Youyang QuResearch Scientist, Data61, CSIRO, Adjunct Assoc. Prof. @SwinburneVerified email at csiro.au
Follow
Keshav Sood
Lecturer in Cyber Security, SMIEEE, Deakin University
Verified email at deakin.edu.au - Homepage