Get my own profile
Public access
View all27 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Peter ChristenProfessor, Australian National University, and University of EdinburghVerified email at anu.edu.au
Rainer SchnellUniversität Duisburg-EssenVerified email at uni-due.de
Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
Anushka VidanageResearch Fellow, Software Innovation Institute, The Australian National UniversityVerified email at anu.edu.au
Ming DingPrincipal Research Scientist & Science Lead, CSIRO, AU; Adjunct Professor@Swinburne; Editor@COMSTVerified email at data61.csiro.au
Charini NanayakkaraSenior Research Officer at the Australian National UniversityVerified email at anu.edu.au
Sirintra VaiwsriLecturer, King Mongkut's University of Technology North BangkokVerified email at itm.kmutnb.ac.th
Jun LiNanjing University of Science an TechnologyVerified email at njust.edu.cn
Nishadi KiriellePhD StudentVerified email at anu.edu.au
Thierry RakotoariveloPrincipal Research Scientist, Data61, CSIROVerified email at data61.csiro.au
Guihai ChenProfessor of Computer ScienceVerified email at nju.edu.cn
Chuan MaAssociate Professor, School of Computer Science, Chongqing UniversityVerified email at cqu.edu.cn
Kang Wei (韦康)PolyU; NJUST; XDUVerified email at polyu.edu.hk
Kee Siong NgAustralian National University / Australian Public ServiceVerified email at anu.edu.au
Sean RandallDeakin UniversityVerified email at deakin.edu.au
Vassilios VerykiosHellenic Open University, GREECEVerified email at eap.gr
Yang Li (Kelvin)Deakin UniversityVerified email at deakin.edu.au
Michael PurcellSenior Fellow, The Australian National UniversityVerified email at anu.edu.au
Timothy GrahamQueensland University of TechnologyVerified email at qut.edu.au
toni makkaiaustralian national universityVerified email at anu.edu.au