Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Dr Nour MoustafaUniversity of New South Wales (UNSW Canberra)Verified email at ieee.org
Nickolaos KoroniotisCyber Security Lecturer, UNSW Canberra CityVerified email at ad.unsw.edu.au
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
David OrmrodUniSAVerified email at unisa.edu.au
Theresa SobbAdjunct Associate Lecturer, University of New South WalesVerified email at adfa.edu.au
Sara SalimResearch Associate at UNSW, CanberraVerified email at unsw.edu.au
Nathan JohnsonVerified email at asu.edu
Martin ReissleinProfessor, School of Electrical, Computer, and Energy Eng., Arizona State UniversityVerified email at asu.edu
Daniel ClarkUNSW CanberraVerified email at student.adfa.edu.au
Matthew WarrenRMIT UniversityVerified email at rmit.edu.au
Simon TjoaSt. Poelten University of Applied SciencesVerified email at fhstp.ac.at
Alex MurrayUbuntu Security Tech Lead at CanonicalVerified email at canonical.com
Marwa KeshkUniversity of New South Wales/ Data61, CSIRO