Get my own profile
Public access
View all17 articles
8 articles
available
not available
Based on funding mandates
Co-authors
Muhammad IkramProject Lead at MQCSH; Deputy Program Leader Cyber Security, Macquarie UniversityVerified email at mq.edu.au
Hassan Jameel AsgharMacquarie University & Data61, CSIROVerified email at data61.csiro.au
Abdelberi ChaabaneBell LabsVerified email at chaabane.org
Emiliano De CristofaroProfessor at University College LondonVerified email at ucl.ac.uk
Arik FriedmanData Scientist, AtlassianVerified email at atlassian.com
gaogang xieInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Laurent MathyUniversity of LiègeVerified email at ulg.ac.be
Shlomo BerkovskyMacquarie UniversityVerified email at mq.edu.au
Jiefeng (Terence) ChenData Scientist - TelstraVerified email at nicta.com.au
Zhenyu LiInstitute of Computing Technology, Chinese Academy of SciencesVerified email at ict.ac.cn
Anirban MahantiAnalystVerified email at seveninvesting.com
Kave SalamatianLISTIC, Universite de Savoie, IXXI, TalTech, Tallinn University of Technology , Estonian MaritimeVerified email at univ-savoie.fr
Mathieu CuncheAssociate Prof. INSA Lyon, Inria, FranceVerified email at insa-lyon.fr
Steve UhligProfessor of Networks & Head of School, EECS, Queen Mary University of LondonVerified email at eecs.qmul.ac.uk
Aruna SeneviratneProfessor of Telecommunications, University of New South WalesVerified email at unsw.edu.au
Benoit DonnetAssociate Professor of Computer Science, Université de LiègeVerified email at uliege.be