Get my own profile
Public access
View all3 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
- Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
- Mohammed AtiquzzamanHitachi Chair, Presidential Professor of Computer Science, University of OklahomaVerified email at ou.edu
- Rajkumar BuyyaSchool of Computing and Information Systems, The Uni of Melbourne; Fellow of IEEE & Academia EuropeaVerified email at unimelb.edu.au
- Abdulatif AlabdulatifAssistant Professor - Qassim university - KSAVerified email at qu.edu.sa
- Alsharif (Sharif) AbuadbbaTeam Leader - CSIRO's Data61, AustraliaVerified email at data61.csiro.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Fengling HanSchool of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
- Upeka PremaratneSenior Lecturer, Dept. of Electronic and Telecommunication Engineering, University of MoratuwaVerified email at uom.lk
- Kithsiri SamarasingheSenior Lecturer, Department of Electronic & Telecommunication Engineering, University of MoratuwaVerified email at ent.mrt.ac.lk