Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Addressing Non-Functional Properties in Software Architecture using ADL, , and . Proceedings of the Sixth Australasian Workshop on Software and System Architectures, Swinburne University of Technology, Australia, (2005)Assessing Security Properties of Software Components: A Software Engineer's Perspective., and . ASWEC, page 199-210. IEEE Computer Society, (2006)A Process Framework for Characterising Security Properties of Component-Based Software Systems., and . Australian Software Engineering Conference, page 358-367. IEEE Computer Society, (2004)Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest., , and . CCTA, page 877-884. IEEE, (2020)Incorporating Business Requirements and Constraints in Database Conceptual Model., , and . APCCM, volume 31 of CRPIT, page 59-64. Australian Computer Society, (2004)Do Cialdini's Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible?, , , , and . RCIS (1), volume 513 of Lecture Notes in Business Information Processing, page 273-288. Springer, (2024)Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model., , , and . Computing, 106 (9): 3031-3062 (September 2024)Data Obfuscation for Privacy and Confidentiality in Cloud Computing., and . QRS Companion, page 195-196. IEEE, (2015)Automatic verification of health regulatory compliance in cloud computing., and . Healthcom, page 719-721. IEEE, (2013)A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components., , and . Australian Software Engineering Conference, page 117-126. IEEE Computer Society, (2001)