Get my own profile
Public access
View all33 articles
21 articles
available
not available
Based on funding mandates
Co-authors
Yan WangProfessor, School of Computing, Macquarie University, Sydney, AustraliaVerified email at mq.edu.au
Rajan ShankaranMacquarie University, AustraliaVerified email at mq.edu.au
Guanfeng LiuMacquarie UniversityVerified email at mq.edu.au
Kashif Saleem (ORCID:0000-0001-80...Center of Excellence in Information Assurance (CoEIA), King Saud UniversityVerified email at ksu.edu.sa
Rolf SchwitterMacquarie UniversityVerified email at mq.edu.au
Josef PieprzykCSIRO Data61Verified email at csiro.au
Guanglou Zheng (ORCID: 0000-0002-...Security Research Institute, Edith Cowan University, Perth, AustraliaVerified email at students.mq.edu.au
Abhaya NayakMacquarie UniversityVerified email at mq.edu.au
"Abdelouahid Derhab"Associate Professor of Computer Science, King Saud UniversityVerified email at ksu.edu.sa
Shuchao PangUniversity of New South WalesVerified email at students.mq.edu.au
Hausi A. MüllerDepartment of Computer Science, Faculty of Engineering, University of Victoria, IEEE Quantum WeekVerified email at cs.uvic.ca
Abdul SattarProfessor of Computer Science, Griffith UniversityVerified email at griffith.edu.au
Bill WadgeProfessor of Computer Science, University of VictoriaVerified email at uvic.ca
Lie QuMacquarie UniversityVerified email at students.mq.edu.au
Scott TilleyProfessor, Florida Institute of TechnologyVerified email at cs.fit.edu
Vijay VaradharajanThe University if NewcastleVerified email at newcastle.edu.au
Haider Abbas, IET FellowProfessor (Tenured) of Cybersecurity @ National University of Sciences and Technology, PakistanVerified email at mcs.edu.pk
Graham WilliamsAustralian National UniversityVerified email at togaware.com
Kai Zheng 郑凯Professor of Computer Science, University of Electronic Science and Technology of ChinaVerified email at uestc.edu.cn
Ee-Peng LimSingapore Management UniversityVerified email at smu.edu.sg
Follow
