Get my own profile
Public access
View all14 articles
3 articles
available
not available
Based on funding mandates
Co-authors
Chengfei LiuSwinburne University of TechnologyVerified email at swin.edu.au
A. S. M. KayesSenior Lecturer in Cybersecurity, Dept of CSIT at La Trobe University, MelbourneVerified email at latrobe.edu.au
Rui ZhouSwinburne University of Technology, AustraliaVerified email at swin.edu.au
Humayun KayeshPhD Candidate, Griffith UniversityVerified email at griffithuni.edu.au
Tarique AnwarUniversity of YorkVerified email at york.ac.uk
David TaniarMonash University, AustraliaVerified email at monash.edu
Wenny RahayuProfessor in Computer Science, La Trobe University, AustraliaVerified email at latrobe.edu.au
S. M. Riazul IslamAssistant Professor, Department of Computer Science and Engineering, Sejong UniversityVerified email at sejong.ac.kr
Jianxin LiDeakin UniversityVerified email at deakin.edu.au
Rafiqul IslamA/Professor in Computing, Charles Sturt UniversityVerified email at csu.edu.au
Bojie ShenMonash UniversityVerified email at monash.edu
Junhu WangGriffith UniversityVerified email at griffith.edu.au
Muhammad Aamir CheemaMonash UniversityVerified email at monash.edu
Mehdi NaseriparsaLecturer at Federation University AustraliaVerified email at federation.edu.au
Follow
Md. Saiful Islam
Lecturer (Big Data Analytics), Griffith University, Australia
Verified email at griffith.edu.au - Homepage