Get my own profile
Public access
View all9 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Muneera BanoCSIRO's Data61Verified email at data61.csiro.au
Vincenzo GervasiUniversity of PisaVerified email at di.unipi.it
Professor Mahmood NiaziKing Fahd University of Petroleum and Minerals Saudi ArabiaVerified email at kfupm.edu.sa
Alessio FerrariResearch Scientist, ISTI CNRVerified email at isti.cnr.it
Zhi JinProfessor of Computer Science, Peking UniversityVerified email at pku.edu.cn
Matthew KearneyProfessor of Education, UTSVerified email at uts.edu.au
Paola SpoletiniKennesaw State UniversityVerified email at kennesaw.edu
David LoweThe University of SydneyVerified email at sydney.edu.au
Samiaji SarosaAssociate Professor, Atma Jaya Yogyakarta UniversityVerified email at uajy.ac.id
Amir Talaei-KhoeiUniversity of Nevada, RenoVerified email at unr.edu
Susan P. WilliamsProfessor, University of Koblenz-LandauVerified email at uni-koblenz.de
Mahdi FahmidehSenior Lecturer in Cyber Security at University of Southern QueenslandVerified email at usq.edu.au
Naveed IkramInternational Islamic University, Riphah International UniversityVerified email at riphah.edu.pk
Beatrice DonatiUniversita degli Studi di FirenzeVerified email at unifi.it
Sandy SchuckAdjunct Professor, University of Technology SydneyVerified email at uts.edu.au
Alan M. DavisUniversity of ColoradoVerified email at offtoa.com
Jay DanielUniversity of DerbyVerified email at derby.ac.uk
Stephen G. MacDonellProfessor at Auckland University of Technology and University of Otago, NZVerified email at acm.org
Stefania GnesiISTI-CNR, ItalyVerified email at isti.cnr.it
Ken BarkerUniversity of CalgaryVerified email at ucalgary.ca