Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mathias PayerEPFL IC, HexHive LaboratoryVerified email at nebelwelt.net
Tony HoskingAustralian National UniversityVerified email at anu.edu.au
Hendra GunadiThe Australian National UniversityVerified email at anu.edu.au
Michael NorrishAustralian National UniversityVerified email at anu.edu.au
Shane MagrathDSTGVerified email at defence.gov.au
Chao ZhangTsinghua UniversityVerified email at tsinghua.edu.cn
Manuel EgeleBoston UniversityVerified email at bu.edu
Flavio ToffaliniEPFL, HexHive LaboratoryVerified email at epfl.ch
Wen Huunsw, csiro, nictaVerified email at unsw.edu.au
George CandeaAssociate Professor of Computer Science, EPFL (Lausanne, Switzerland)Verified email at epfl.ch
Vitaly ChipounovCyberhavenVerified email at chipounov.fr
Ben CheneyComputer Security Researcher, Defence Science and Technology OrganisationVerified email at dsto.defence.gov.au
Charles Gretton, FIEAustThe Australian National UniversityVerified email at anu.edu.au
Alwen TiuSchool of Computing, The Australian National UniversityVerified email at anu.edu.au
Damith C. RanasingheThe University of Adelaide, University of CambridgeVerified email at cs.adelaide.edu.au
Simon LuoThe University of SydneyVerified email at uni.sydney.edu.au
salil kanhereProfessor, UNSW Sydney, AustraliaVerified email at unsw.edu.au