Get my own profile
Public access
View all23 articles
29 articles
available
not available
Based on funding mandates
Co-authors
Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
Jiguo LiProfessor of Computer Science, Fujian Normal UniversityVerified email at hhu.edu.cn
Yi MuProfessorVerified email at cityu.mo
Weizhi MengProfessor, Lancaster University, United KingdomVerified email at lancaster.ac.uk
Man Ho AuProfessor, The Hong Kong Polytechnic UniversityVerified email at comp.polyu.edu.hk
Jun YanUniversity of WollongongVerified email at uow.edu.au
Liqun ChenProfessor, University of Surrey, UKVerified email at surrey.ac.uk
Jian ShenZhejiang Sci-Tech UniversityVerified email at zstu.edu.cn
Dr. Kaitai LiangCybersecurity Group, EEMCS, TU DELFTVerified email at tudelft.nl
Jianying ZhouProfessor, Singapore University of Technology and Design (SUTD)Verified email at sutd.edu.sg
huaqun WangNanjing University of Posts and TelecommunicationsVerified email at njupt.edu.cn
Helen TreharneProfessor, Surrey Centre for Cyber SecurityVerified email at surrey.ac.uk
Steve SchneiderDirector of Computer Science Research Centre; Professor of Computing, University of SurreyVerified email at surrey.ac.uk
Chunhua SuDivision of Computer Science, University of Aizu, JapanVerified email at u-aizu.ac.jp
Tsz Hon YuenMonash UniversityVerified email at monash.edu
Yogachandran RAHULAMATHAVANReader in Cybersecurity and Privacy, Loughborough University, UKVerified email at lboro.ac.uk
FEI LICity University LondonVerified email at city.ac.uk
Rongxing LuIEEE Fellow, Professor in School of Computing, Queen's UniversityVerified email at queensu.ca
Muttukrishnan RajarajanProfessor of Security Engineering, City, University of LondonVerified email at city.ac.uk
Joseph K. LiuFull Professor, Faculty of IT, Monash UniversityVerified email at monash.edu