Get my own profile
Public access
View all23 articles
5 articles
available
not available
Based on funding mandates
Co-authors
Cliff B JonesProfessor of Computing Science, Newcastle University, UKVerified email at ncl.ac.uk
Larissa MeinickeThe University of QueenslandVerified email at uq.edu.au
Brijesh DongolUniversity of SurreyVerified email at surrey.ac.uk
Colin FidgeQueensland University of TechnologyVerified email at qut.edu.au
Mark UttingThe University of QueenslandVerified email at uq.edu.au
Carroll MorganProfessor, University of New South WalesVerified email at unsw.edu.au
Brendan MahonyResearch Scientist, Defence Science and Technology GroupVerified email at dst.defence.gov.au
Bill Roscoe (A.W. Roscoe)Emeritus Professor of Computer Science, Oxford UniversityVerified email at cs.ox.ac.uk
Alan BurnsUniversity of York, UKVerified email at york.ac.uk
Georg StruthUniversity of SheffieldVerified email at sheffield.ac.uk
Dr Luke WildmanQueenslandVerified email at rgbassurance.com.au
Graeme SmithThe University of QueenslandVerified email at itee.uq.edu.au
John DerrickUniversity of SheffieldVerified email at sheffield.ac.uk
Andrius VelykisPhD Student, Newcastle UniversityVerified email at newcastle.ac.uk
Andrew MartinProfessor of Systems Security, University of OxfordVerified email at cs.ox.ac.uk
John S. FitzgeraldNewcastle University, UKVerified email at ncl.ac.uk
Colin MillerchipVerified email at millerchip.org
Nigel WardQueensland Cyber Infrastructure FoundationVerified email at qcif.edu.au
Chenyi ZhangUniversity of CanterburyVerified email at canterbury.ac.nz
Eban EscottPh.D, University of Queensland, School of Information Technology and ElectricalVerified email at uqconnect.edu.au
Follow
Ian James Hayes
Professor of Software Engineering, The University of Queensland
Verified email at uq.edu.au