Get my own profile
Public access
View all39 articles
19 articles
available
not available
Based on funding mandates
Co-authors
- Yan WangProfessor, School of Computing, Macquarie University, Sydney, AustraliaVerified email at mq.edu.au
- Rajan ShankaranMacquarie University, AustraliaVerified email at mq.edu.au
- Guanfeng LiuMacquarie UniversityVerified email at mq.edu.au
- Kashif Saleem (ORCID:0000-0001-80...Center of Excellence in Information Assurance, King Saud UniversityVerified email at ksu.edu.sa
- Rolf SchwitterMacquarie UniversityVerified email at mq.edu.au
- Josef PieprzykCSIRO Data61Verified email at csiro.au
- Shuchao PangUniversity of New South WalesVerified email at students.mq.edu.au
- "Abdelouahid Derhab"Associate Professor of Computer Science, King Saud UniversityVerified email at ksu.edu.sa
- Abhaya NayakMacquarie UniversityVerified email at mq.edu.au
- Hausi A. MüllerDepartment of Computer Science, Faculty of Engineering, University of Victoria, IEEE Quantum WeekVerified email at cs.uvic.ca
- Abdul SattarProfessor of Computer Science, Griffith UniversityVerified email at griffith.edu.au
- Bill WadgeProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
- Lie QuMacquarie UniversityVerified email at students.mq.edu.au
- Scott TilleyProfessor, Florida Institute of TechnologyVerified email at cs.fit.edu
- Vijay VaradharajanThe University if NewcastleVerified email at newcastle.edu.au
- Haider Abbas, IET FellowProfessor (Tenured) of Cybersecurity @ National University of Sciences and Technology, PakistanVerified email at mcs.edu.pk
- Ee-Peng LimSingapore Management UniversityVerified email at smu.edu.sg
- Graham WilliamsAustralian National UniversityVerified email at togaware.com
- Mahmud HasanDepartment of Computing, Macquarie UniversityVerified email at iut-dhaka.edu
- Kai Zheng 郑凯Professor of Computer Science, University of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Follow