Get my own profile
Public access
View all16 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Jemal AbawajyFull Professor, Deakin University, AustraliaVerified email at deakin.edu.au
Herbert F JelinekDepartment of Medical Sciences, Khalifa University, Abu DhabiVerified email at ku.ac.ae
Morshed U.ChowdhurySenior Lecturer, School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Stephen QuinnAssociate Professor, Swinburne University of TechnologyVerified email at swin.edu.au
Andrew StranieriFederation University Australia, VictoriaVerified email at federation.edu.au
Xuechao YangCollege of ABLE&IT, Victoria UniversityVerified email at vu.edu.au
Joe RyanUniversity of NewcastleVerified email at newcastle.edu.au
Byeong Ho KangProfessor, University of TasmaniaVerified email at utas.edu.au
Fengling HanSchool of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
Richard DazeleyProfessor of Artificial Intelligence and Machine Learning, School of Information Technology, DeakinVerified email at deakin.edu.au
Peter VamplewProfessor, Information Technology, Federation University AustraliaVerified email at federation.edu.au
Gleb BeliakovDeakin UniversityVerified email at deakin.edu.au
Jilyana Cazaranstay-at-home mother, formerly Louisiana State UniversityVerified email at math.lsu.edu
David CornforthIndependent ScholarVerified email at ncis.org
Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
Leanne RylandsWestern Sydney University, AustraliaVerified email at westernsydney.edu.au
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Sorin DascalescuUniversitatea din BucurestiVerified email at fmi.unibuc.ro
Mirka MillerUniversity of Newcastle, Australia & University of West Bohemia, Czech RepublicVerified email at newcastle.edu.au