Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Abdullah BazAssociate Professor of Computer System Design, Umm Al-Qura UniversityVerified email at uqu.edu.sa
- Rajeev Kumar (Dr.)Assistant Professor, Centre for Innovation and Technology, Administrative Staff College of IndiaVerified email at asci.org.in
- Prof. Mohammed BazTaif UniversityVerified email at tu.edu.sa
- Ahmad AlhindiAssociate Professor, Umm Al-Qura University, IEEE Senior MemberVerified email at uqu.edu.sa
- Tariq Alwada'nTeesside UniversityVerified email at tees.ac.uk
- Helge JanickeCyber Security Cooperative Research Centre, Edith Cowan UniversityVerified email at cybersecuritycrc.org.au
- Hamza AldabbasAssociate Professor, Al-Balqa Applied UniversityVerified email at bau.edu.jo
- Adil Hussain SehPhD |UGC NET| JKSETVerified email at bbau.ac.in
- Feng ChenDe Montfort UniversityVerified email at dmu.ac.uk
- Prof. Raees Ahmad KhanHead, Department of Information Technology, Professor of Information Technology, BBA UniversityVerified email at bbau.ac.in