Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Harald SøndergaardComputing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Bernard PopeThe University of MelbourneVerified email at unimelb.edu.au
- Vanessa TeagueThinking Cybersecurity and The Australian National UniversityVerified email at anu.edu.au
- Justin ZobelComputing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
- Philip DartSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Kim MarriottProfessor, Monash UniversityVerified email at monash.edu
- NeelofarMonash University, Melbourne, AustraliaVerified email at monash.edu
- Leon SterlingUniversity of Melbourne & Swinburne University of TechnologyVerified email at swin.edu.au
- Tal MoranIDC HerzliyaVerified email at idc.ac.il
- Doug PalmerCSIROVerified email at csiro.au
- John ShepherdComputer Science and Engineering (CSE), UNSWVerified email at cse.unsw.edu.au
- Isaac BalbinAssociate Professor of Database Systems, RMIT UniversityVerified email at rmit.edu.au
- Graeme PortUniversity of MelbourneVerified email at unimelb.edu.au
- Michelle BlomSchool of Computing and Information Systems, The University of MelbourneVerified email at unimelb.edu.au
- Graeme GangeMonash UniversityVerified email at monash.edu
- Manuel HermenegildoIMDEA Software Institute and Technical U. of Madrid (UPM)Verified email at upm.es
- Peter SchachteSchool of Computing and Information Systems, University of MelbourneVerified email at unimelb.edu.au
- Prof R KotagiriRetired Professor,Verified email at acm.org