Get my own profile
Public access
View all9 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Muneera BanoCSIRO's Data61Verified email at data61.csiro.au
Vincenzo GervasiUniversity of PisaVerified email at di.unipi.it
Professor Mahmood NiaziKing Fahd University of Petroleum and Minerals Saudi ArabiaVerified email at kfupm.edu.sa
Alessio FerrariResearch Scientist, ISTI CNRVerified email at isti.cnr.it
Zhi JinProfessor, Peking UniversityVerified email at pku.edu.cn
Paola SpoletiniKennesaw State UniversityVerified email at kennesaw.edu
Matthew KearneyProfessor of Education, UTSVerified email at uts.edu.au
David LoweThe University of SydneyVerified email at sydney.edu.au
Samiaji SarosaAssociate Professor, Atma Jaya Yogyakarta UniversityVerified email at uajy.ac.id
Amir Talaei-KhoeiUniversity of Nevada, RenoVerified email at unr.edu
Susan P. WilliamsProfessor, University of KoblenzVerified email at uni-koblenz.de
Zahra Shakeri Hossein AbadUniversity of TorontoVerified email at utoronto.ca
Mahdi FahmidehSenior Lecturer in Cyber Security at University of Southern QueenslandVerified email at usq.edu.au
Beatrice DonatiUniversita degli Studi di FirenzeVerified email at unifi.it
Naveed IkramInternational Islamic University, Riphah International UniversityVerified email at riphah.edu.pk
Sandy SchuckAdjunct Professor, University of Technology SydneyVerified email at uts.edu.au
Alan M. DavisOfftoa, Inc.Verified email at offtoa.com
Stephen G. MacDonellProfessor at Auckland University of Technology and University of Otago, NZVerified email at acm.org
Jay DanielUniversity of DerbyVerified email at derby.ac.uk
Stefania GnesiISTI-CNR, ItalyVerified email at isti.cnr.it