Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
Tony HoskingAustralian National UniversityVerified email at anu.edu.au
Hendra GunadiThe Australian National UniversityVerified email at anu.edu.au
Michael NorrishAustralian National UniversityVerified email at anu.edu.au
Shane MagrathDSTGVerified email at defence.gov.au
Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
Manuel EgeleBoston UniversityVerified email at bu.edu
Flavio ToffaliniRUB, Assistant ProfessorVerified email at rub.de
Wen Huunsw, csiro, nictaVerified email at unsw.edu.au
George CandeaAssociate Professor of Computer Science, EPFL (Lausanne, Switzerland)Verified email at epfl.ch
Vitaly ChipounovCyberhavenVerified email at chipounov.fr
Ben CheneyComputer Security Researcher, Defence Science and Technology OrganisationVerified email at dsto.defence.gov.au
Damith C. RanasingheThe University of Adelaide, University of CambridgeVerified email at cs.adelaide.edu.au
Simon LuoThe University of SydneyVerified email at uni.sydney.edu.au
salil kanhereProfessor, UNSW Sydney, AustraliaVerified email at unsw.edu.au
Charles Gretton, FIEAustThe Australian National UniversityVerified email at anu.edu.au
Alwen TiuSchool of Computing, The Australian National UniversityVerified email at anu.edu.au