Get my own profile
Public access
View all60 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dinusha VatsalanSenior Lecturer in Cyber Security, Macquarie UniversityVerified email at mq.edu.au
Charith PereraCardiff University, UKVerified email at acm.org
Thilina RanbadugeAustralian National University and Data 61, CSIROVerified email at anu.edu.au
Arkady ZaslavskyDeakin University, Data61 @ CSIRO, Monash University, Lulea University of Technology(Sweden)Verified email at deakin.edu.au
Dimitrios GeorgakopoulosSwinburne University of TechnologyVerified email at swin.edu.au
Tim ChurchesUNSW Australia, Faculty of MedicineVerified email at unsw.edu.au
Vassilios VerykiosHellenic Open University, GREECEVerified email at eap.gr
Markus HeglandThe Australian National UniversityVerified email at anu.edu.au
Rainer SchnellUniversität Duisburg-EssenVerified email at uni-due.de
Erhard RahmProfessor of Computer Science, University of LeipzigVerified email at informatik.uni-leipzig.de
Ross W GaylerIndependent ResearcherVerified email at rossgayler.com
Stephen G RobertsMathematics, Australian National UniversityVerified email at anu.edu.au
Khoi-Nguyen TranSenior Research Software Engineer, IBM Research - AlmadenVerified email at ibm.com
Graham WilliamsAustralian National UniversityVerified email at togaware.com
Minkyoung KimAssistant Professor of Big Data Analytics, Kyung Hee University, Seoul, KoreaVerified email at khu.ac.kr
Michael ComptonCSIROVerified email at csiro.au
Prem Prakash JayaramanSwinburne University of TechnologyVerified email at swinburne.edu.au
David NewthCommonwealth Scientific and Industrial Research OrganizationVerified email at csiro.au
David HandImperial College LondonVerified email at imperial.ac.uk
Anushka VidanageResearch Fellow, Software Innovation Institute, The Australian National UniversityVerified email at anu.edu.au
Follow
Peter Christen
Professor, Australian National University, and University of Edinburgh
Verified email at anu.edu.au - Homepage