Crea il mio profilo
Accesso pubblico
Visualizza tutto10 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityEmail verificata su rmit.edu.au
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityEmail verificata su rmit.edu.au
- Mohammed AtiquzzamanHitachi Chair, Presidential Professor of Computer Science, University of OklahomaEmail verificata su ou.edu
- Elisa BertinoProfessor of Computer Science, Purdue UniversityEmail verificata su purdue.edu
- Surya NepalCSIRO’s Data61, AustraliaEmail verificata su csiro.au
- Abdur Rahman Bin Shahid, Ph.D.Assistant Professor and Director of SHIELD Lab, Southern Illinois University CarbondaleEmail verificata su cs.siu.edu
- Dr. Hasan sarwarUnited International UniversityEmail verificata su cse.uiu.ac.bd
- Andrei KelarevRMIT UniversityEmail verificata su rmit.edu.au
- tan kim geokFaculty of Engineering & TechnologyEmail verificata su mmu.edu.my
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongEmail verificata su uow.edu.au
- Norrima MokhtarLecturer, University of MalayaEmail verificata su um.edu.my
- Zuwairie IbrahimUniversiti Malaysia PahangEmail verificata su ump.edu.my
- Afaz Uddin AhmedPhDEmail verificata su uqconnect.edu.au
- Fayeem AzizResearch and development engineer, Ampcontrol ltdEmail verificata su restech.net.au