Get my own profile
Public access
View all44 articles
5 articles
available
not available
Based on funding mandates
Co-authors
John GrundyAustralian Laureate Fellow and Professor of Software Engineering, Faculty of IT, Monash UniversityVerified email at monash.edu
Amani S. IbrahimSenior Lecturer in Cybersecurity, Deakin UniversityVerified email at deakin.edu.au
Qiang HeAssociate Professor, Swinburne University of TechnologyVerified email at swin.edu.au
Feifei ChenSenior Lecturer, Deakin UniversityVerified email at deakin.edu.au
John HoskingDean of Science, University of AucklandVerified email at auckland.ac.nz
Xiaoyu XiaThe University of Adelaide, AustraliaVerified email at adelaide.edu.au
Phu LaiLa Trobe UniversityVerified email at latrobe.edu.au
Yun YangSwinburne University of TechnologyVerified email at swin.edu.au
Hai JinHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Guangming CuiSwinburne University of TechnologyVerified email at swin.edu.au
J H Hamlyn-HarrisSwinburne University of TechnologyVerified email at swin.edu.au
Rajesh VasaHead of Translational Research, Applied Artificial Intelligence Institute, Deakin UniversityVerified email at deakin.edu.au
Hourieh KhalajzadehMonash UniversityVerified email at monash.edu
Iman AvazpourFounder and Software EngineerVerified email at e-techs.co.uk
Aya Zaki-IsmailPhD Student at Deakin UniversityVerified email at deakin.edu.au
Mohamed OsamaPhD Student, Faculty of IT, Deakin UniversityVerified email at deakin.edu.au
Humphrey O. ObieResearch Fellow, Faculty of Information Technology, Monash UniversityVerified email at monash.edu
Alex CummaudoDeakin UniversityVerified email at deakin.edu.au
Caslon ChuaSenior Lecturer, Swinburne University of TechnologyVerified email at swin.edu.au
Maheswaree Kissoon CurumsingDeakin UniversityVerified email at a2i2.ai
Follow
Mohamed Abdelrazek
Associate Professor of Software Engineering, Deakin University
Verified email at deakin.edu.au - Homepage