Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
James ThomRMIT UniversityVerified email at rmit.edu.au
Harald SøndergaardComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
B PopeThe University of MelbourneVerified email at unimelb.edu.au
Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
Justin ZobelComputing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
Philip DartSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Doug PalmerCSIROVerified email at csiro.au
Kim MarriottProfessor, Monash UniversityVerified email at monash.edu
NeelofarMonash University, Melbourne, AustraliaVerified email at monash.edu
Tal MoranIDC HerzliyaVerified email at idc.ac.il
John ShepherdComputer Science and Engineering (CSE), UNSWVerified email at cse.unsw.edu.au
Isaac BalbinAssociate Professor of Database Systems, RMIT UniversityVerified email at rmit.edu.au
Graeme PortUniversity of MelbourneVerified email at unimelb.edu.au
Michelle BlomSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
Graeme GangeMonash UniversityVerified email at monash.edu
Manuel HermenegildoIMDEA Software Institute and Technical U. of Madrid (UPM)Verified email at upm.es
Peter SchachteSchool of Computing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
Prof R KotagiriProfessor, Computing and Information Systems, The University of Melbourne 1980-2020Verified email at unimelb.edu.au
Follow
Lee Naish
Computing and Information Systems, University of Melbourne
Verified email at unimelb.edu.au - Homepage