Get my own profile
Public access
View all10 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Muneera BanoCSIRO's Data61Verified email at data61.csiro.au
Vincenzo GervasiUniversity of PisaVerified email at di.unipi.it
Professor Mahmood NiaziKing Fahd University of Petroleum and Minerals Saudi ArabiaVerified email at kfupm.edu.sa
Alessio FerrariResearch Scientist, ISTI CNRVerified email at isti.cnr.it
Paola SpoletiniKennesaw State UniversityVerified email at kennesaw.edu
Zhi JinProfessor, Peking UniversityVerified email at pku.edu.cn
Matthew KearneyAdjunct Professor of Education, UTSVerified email at uts.edu.au
David LoweThe University of SydneyVerified email at sydney.edu.au
Amir Talaei-KhoeiUniversity of Nevada, RenoVerified email at unr.edu
Samiaji SarosaAssociate Professor, Atma Jaya Yogyakarta UniversityVerified email at uajy.ac.id
Susan P. WilliamsProfessor, University of KoblenzVerified email at uni-koblenz.de
Jon WhittleCSIRO's Data61Verified email at data61.csiro.au
Mahdi FahmidehSenior Lecturer (Assistant Professor) in Cyber Security at University of Southern QueenslandVerified email at usq.edu.au
Qinghua LuData61, CSIROVerified email at data61.csiro.au
Beatrice DonatiUniversita degli Studi di FirenzeVerified email at unifi.it
Jay DanielUniversity of DerbyVerified email at derby.ac.uk
Sandy SchuckAdjunct Professor, University of Technology SydneyVerified email at uts.edu.au
Peter AubussonUniversity of Technology SydneyVerified email at uts.edu.au
Naveed IkramInternational Islamic University, Riphah International UniversityVerified email at riphah.edu.pk
Rifat Ara ShamsPostdoctoral Research Fellow, CSIRO's Data61Verified email at csiro.au