Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Jun HanProfessor of Software Engineering, Swinburne University of Technology, AustraliaVerified email at swin.edu.au
Professor Ashad Kabir, Ph.DProfessor and Deputy Leader of Data Mining Research, Charles Sturt UniversityVerified email at csu.edu.au
Iqbal H Sarker, PhDCUET | Swinburne University | University of Technology Sydney | Cyber Security CRC | ECU, AustraliaVerified email at ecu.edu.au
Malinda KapurugePostdoctoral research fellow at Swinburne University of TechnologyVerified email at swin.edu.au
Jian YuAuckland University of TechnologyVerified email at aut.ac.nz
Liuping WangProfessor of Control Engineering, RMIT UniversityVerified email at rmit.edu.au
Mahmoud HusseinMenoufia University, Faculty of Computers and InformationVerified email at ci.menofia.edu.eg
A. S. M. KayesSenior Lecturer in Cybersecurity, Dept of CSIT at La Trobe University, MelbourneVerified email at latrobe.edu.au
Indika Priyantha Kumara Weerasingha...Assistant Professor, Tilburg University - Jheronimus Academy of Data ScienceVerified email at tilburguniversity.edu
Lars GrunskeProfessor for Software Engineering, Humboldt-Universität zu Berlin, GermanyVerified email at informatik.hu-berlin.de
Ayman A. AminAssociate Professor of Statistics, Menoufia UniversityVerified email at commerce.menofia.edu.eg
Tuan NguyenSwinburne University of TechnologyVerified email at swin.edu.au
Mohan Baruwal ChhetriPrincipal Research Scientist, CSIRO, AustraliaVerified email at data61.csiro.au
Ron AddieAssociate Professor of Computer Science, University of Southern QueenslandVerified email at usq.edu.au
Ryszard KowalczykSmartSat CRC Professorial Chair in Artificial IntelligenceVerified email at unisa.edu.au