Get my own profile
Public access
View all55 articles
20 articles
available
not available
Based on funding mandates
Co-authors
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Hossein GhodosiSenior Lecturer, College of Business, Law and Governance, James Cook UniversityVerified email at jcu.edu.au
Mehmet A. OrgunSchool of Computing, Macquarie UniversityVerified email at mq.edu.au
Paweł MorawieckiPolish Academy of SciencesVerified email at ipipan.waw.pl
Leonie SimpsonAssociate Professor, Faculty of Science, Queensland University of Technology. Brisbane, AUSTRALIAVerified email at qut.edu.au
Yuliang ZhengProfessor & Chair, Computer Science, University of Alabama at BirminghamVerified email at uab.edu
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Babak SadeghiyanAssociate Professor of Computer Engineering, Amirkabir University of Technology (Tehran Polytechnic)Verified email at aut.ac.ir
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Nicolas T. CourtoisQualcomm Sophia AntipolisVerified email at bettercrypto.com
Hassan Jameel AsgharMacquarie UniversityVerified email at mq.edu.au
Stephen McCombieNHL Stenden University of Applied ScienceVerified email at nhlstenden.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
Iftekhar SalamXiamen University MalaysiaVerified email at xmu.edu.my
Kang Leng ChiewUniversiti Malaysia SarawakVerified email at unimas.my