Get my own profile
Public access
View all9 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Elisa BertinoProfessor of Computer Science, Purdue UniversityVerified email at purdue.edu
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Athman BouguettayaSchool of Computer Science University of SydneyVerified email at sydney.edu.au
- Murat KantarciogluProfessor of Computer Science, University of Texas at DallasVerified email at utdallas.edu
- Jianneng Cao (曹健能)Bank JagoVerified email at tech.jago.com
- Bharath Kumar SamanthulaAssociate Professor, Department of Computer Science, Montclair State UniversityVerified email at montclair.edu
- Kwok-Yan LamNanyang Technological UniversityVerified email at ntu.edu.sg
- Dongxi LiuCSIROVerified email at csiro.au
- Gabriel GhinitaHamad Bin Khalifa UniversityVerified email at umb.edu
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
- Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
- Feng HaoProfessor of Security Engineering, Department of Computer Science, University of WarwickVerified email at warwick.ac.uk
- chenyun daiPurdue UniversityVerified email at cs.purdue.edu
- Traian Marius TrutaProfessor of Computer Science, Northern Kentucky UniversityVerified email at nku.edu