Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
- Tony HoskingAustralian National UniversityVerified email at anu.edu.au
- Hendra GunadiThe Australian National UniversityVerified email at anu.edu.au
- Michael NorrishAustralian National UniversityVerified email at anu.edu.au
- Shane MagrathDSTGVerified email at defence.gov.au
- Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
- Manuel EgeleBoston UniversityVerified email at bu.edu
- Flavio ToffaliniRUB, Assistant ProfessorVerified email at rub.de
- Wen Huunsw, csiro, nictaVerified email at unsw.edu.au
- George CandeaAssociate Professor of Computer Science, EPFL (Lausanne, Switzerland)Verified email at epfl.ch
- Vitaly ChipounovCyberhavenVerified email at chipounov.fr
- Ben CheneyComputer Security Researcher, Defence Science and Technology OrganisationVerified email at dsto.defence.gov.au
- Charles Gretton, FIEAustThe Australian National UniversityVerified email at anu.edu.au
- Alwen TiuSchool of Computing, The Australian National UniversityVerified email at anu.edu.au
- Damith C. RanasingheThe University of Adelaide, University of CambridgeVerified email at cs.adelaide.edu.au
- Simon LuoThe University of SydneyVerified email at uni.sydney.edu.au
- salil kanhereProfessor, UNSW Sydney, AustraliaVerified email at unsw.edu.au