Get my own profile
Public access
View all54 articles
11 articles
available
not available
Based on funding mandates
Co-authors
John GrundyAustralian Laureate Fellow and Professor of Software Engineering, Faculty of IT, Monash UniversityVerified email at monash.edu
Amani S. IbrahimSenior Lecturer in Cybersecurity, Deakin UniversityVerified email at deakin.edu.au
Qiang HeProfessorVerified email at swin.edu.au
Feifei ChenSenior Lecturer, Deakin UniversityVerified email at deakin.edu.au
John HoskingDean of Science, University of AucklandVerified email at auckland.ac.nz
Xiaoyu XiaRMIT UniversityVerified email at rmit.edu.au
Phu LaiLa Trobe UniversityVerified email at latrobe.edu.au
Hai JinHuazhong University of Science and TechnologyVerified email at hust.edu.cn
Yun YangSwinburne University of TechnologyVerified email at swin.edu.au
Guangming CuiNanjing University of Information Science & TechnologyVerified email at nuist.edu.cn
Rajesh VasaHead of Translational Research, Applied Artificial Intelligence Institute, Deakin UniversityVerified email at deakin.edu.au
J H Hamlyn-HarrisSwinburne University of TechnologyVerified email at swin.edu.au
Hourieh KhalajzadehDeakin UniversityVerified email at monash.edu
Iman AvazpourFounder and Software EngineerVerified email at e-techs.co.uk
Aya Zaki-IsmailPhD Student at Deakin UniversityVerified email at deakin.edu.au
Mohamed OsamaPhD Student, Faculty of IT, Deakin UniversityVerified email at deakin.edu.au
Alessio BontiDeakin UniversityVerified email at deakin.edu.au
Elton LoboPostdoctoral Research Fellow at the University of QueenslandVerified email at uq.edu.au
Sheikh Mohammed Shariful IslamAssociate Professor, Institute for Physical Activity and Nutrition (IPAN), Deakin UniversityVerified email at deakin.edu.au
Anne FrĝlichChief PhysicianVerified email at dadlnet.dk
Follow
Mohamed Abdelrazek
Professor of Software Engineering, Deakin University
Verified email at deakin.edu.au - Homepage