Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
David M W PowersProfessor of Computer and Cognitive Science, College of Science and Engineering, Flinders UniversityVerified email at flinders.edu.au
Jon WhittleCSIRO's Data61Verified email at data61.csiro.au
Harsha PereraPostdoctoral Research Fellow, CSIRO, AustraliaVerified email at csiro.au
Rifat Ara ShamsPostdoctoral Research Fellow, CSIRO's Data61Verified email at csiro.au
Simon EvansUniversity of Surrey, UKVerified email at sussex.ac.uk
Mahdi FahmidehSenior Lecturer (Assistant Professor) in Cyber Security at University of Southern QueenslandVerified email at usq.edu.au
Aditya GhoseProfessor of Computer Science, University of WollongongVerified email at uow.edu.au
Jun YanUniversity of WollongongVerified email at uow.edu.au
Jun ShenUniversity of WollongongVerified email at uow.edu.au
Aakash AhmadAssistant Professor - Lancaster University Leipzig, GermanyVerified email at lancaster.ac.uk
Moein AlmasiUniversity of ManitobaVerified email at cs.umanitoba.ca
Arif NurwidyantoroAssistant Professor, Department of Computer Science and Electronics, Universitas Gadjah MadaVerified email at ugm.ac.id
Jaime Simão SichmanFull Professor, University of São Paulo, BrazilVerified email at usp.br
Amanul HaqueNorth Carolina State UniversityVerified email at ncsu.edu
Asghar MoeiniThe University of MelbourneVerified email at unimelb.edu.au
Gillian OliverMonash UniversityVerified email at monash.edu
Francisco Braulio OliveiraMSc Candidate, Universidade de São PauloVerified email at usp.br
Wan Nurhayati Wan Ab RahmanUniversiti Putra MalaysiaVerified email at upm.edu.my
Munindar P SinghProfessor of Computer Science, North Carolina State UniversityVerified email at ncsu.edu
John C. GrundyAustralian Laureate Fellow and Professor of Software Engineering, Faculty of IT, Monash UniversityVerified email at monash.edu