Get my own profile
Public access
View all50 articles
21 articles
available
not available
Based on funding mandates
Co-authors
Huaxiong WangNanyang Technological University, SingaporeVerified email at ntu.edu.sg
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Ron SteinfeldAssociate Professor, Monash UniversityVerified email at monash.edu
Reihaneh Safavi -NainiUniversity of CalgaryVerified email at ucalgary.ca
Hossein GhodosiSenior Lecturer, College of Business, Law and Governance, James Cook UniversityVerified email at jcu.edu.au
Paweł MorawieckiPolish Academy of SciencesVerified email at ipipan.waw.pl
Mehmet A. OrgunSchool of Computing, Macquarie UniversityVerified email at mq.edu.au
Yuliang ZhengProfessor & Chair, Computer Science, University of Alabama at BirminghamVerified email at uab.edu
Krystian MatusiewiczSecurity Researcher at IntelVerified email at intel.com
Leonie SimpsonSenior Lecturer, Science and Engineering Faculty, Queensland University of TechnologyVerified email at qut.edu.au
Babak SadeghiyanAssociate Professor of Computer Engineering, Amirkabir University of Technology (Tehran Polytechnic)Verified email at aut.ac.ir
Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongVerified email at uow.edu.au
Nicolas T. CourtoisQualcomm Sophia AntipolisVerified email at bettercrypto.com
Hassan Jameel AsgharMacquarie University & Data61, CSIROVerified email at data61.csiro.au
Stephen McCombieNHL Stenden University of Applied ScienceVerified email at nhlstenden.com
Ivica NikolićNational University of SingaporeVerified email at nus.edu.sg
Professor Paul WattersCyberstronomy Pty LtdVerified email at cyberstronomy.com
Shujun Li (李树钧)Professor of Cyber Security, School of Computing, University of KentVerified email at kent.ac.uk
Kang Leng ChiewUniversiti Malaysia SarawakVerified email at unimas.my
Keith M. MartinRoyal Holloway, University of LondonVerified email at rhul.ac.uk