Get my own profile
Public access
View all5 articles
1 article
available
not available
Based on funding mandates
Co-authors
Nour MoustafaAcademic Lead in Cyber Security & Computing, ARC DECRA Fellow, Spitfire Defence FellowVerified email at ieee.org
Kim-Kwang Raymond ChooCloud Tech Endowed Professor, University of Texas at San AntonioVerified email at utsa.edu
Nickolaos KoroniotisCyber Security Lecturer, UNSW Canberra CityVerified email at ad.unsw.edu.au
Prof. Jiankun HuUniversity of New South Wales, CanberraVerified email at adfa.edu.au
David OrmrodUniSAVerified email at unisa.edu.au
Theresa SobbAdjunct Associate Lecturer, University of New South WalesVerified email at adfa.edu.au
Sara SalimResearch Associate at UNSW, CanberraVerified email at unsw.edu.au
Nathan JohnsonVerified email at asu.edu
Martin ReissleinProfessor, School of Electrical, Computer, and Energy Eng., Arizona State UniversityVerified email at asu.edu
Eoghan CaseyUniversity of LausanneVerified email at unil.ch
Daniel ClarkUNSW CanberraVerified email at student.adfa.edu.au
Matthew WarrenRMIT UniversityVerified email at rmit.edu.au
Simon TjoaSt. Poelten University of Applied SciencesVerified email at fhstp.ac.at
Alex MurrayUbuntu Security Tech Lead at CanonicalVerified email at canonical.com
Marwa KeshkUniversity of New South Wales/ Data61, CSIRO