Get my own profile
Public access
View all8 articles
3 articles
available
not available
Based on funding mandates
Co-authors
- Xun YiProfessor of Cybersecurity, School of Computing Technologies, RMIT UniversityVerified email at rmit.edu.au
- Fengling HanSchool of Computing Technologies, RMIT University, AustraliaVerified email at rmit.edu.au
- Andrei KelarevRMIT UniversityVerified email at rmit.edu.au
- Surya NepalCSIRO’s Data61, AustraliaVerified email at csiro.au
- Ibrahim KhalilProfessor, School of Computing Technologies, STEM College, RMIT UniversityVerified email at rmit.edu.au
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
- Hui CuiMonash UniversityVerified email at monash.edu
- Dimitrios GeorgakopoulosSwinburne University of TechnologyVerified email at swin.edu.au
- Prem Prakash JayaramanSwinburne University of TechnologyVerified email at swinburne.edu.au
- Ron van SchyndelAcademic at RMIT University, Melbourne, AustraliaVerified email at rmit.edu.au
- Caspar RyanSchool of CS & IT, RMIT UniversityVerified email at rmit.edu.au
- Andy SongA/Prof of AI, School of Computing Technologies, CIAIRI, RMIT UniversityVerified email at rmit.edu.au
- Yong FengHarbin Institute of Technology, China; RMIT University, AustraliaVerified email at hit.edu.cn