Get my own profile
Public access
View all9 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
Mohammed AtiquzzamanPresidential Professor of Computer Science, University of OklahomaVerified email at ou.edu
Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
Dr. Hasan sarwarUnited International UniversityVerified email at cse.uiu.ac.bd
Andrei KelarevRMIT UniversityVerified email at rmit.edu.au
Abdur Rahman Bin Shahid, Ph.D.Assistant Professor of Computer and Information Systems, Robert Morris UniversityVerified email at rmu.edu
tan kim geokFaculty of Engineering & TechnologyVerified email at mmu.edu.my
Norrima MokhtarLecturer, University of MalayaVerified email at um.edu.my
Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
Zuwairie IbrahimUniversiti Malaysia PahangVerified email at ump.edu.my
Afaz Uddin AhmedPhD StudentVerified email at uqconnect.edu.au
Fayeem AzizResearch and development engineer, Ampcontrol ltdVerified email at restech.net.au