Get my own profile
Public access
View all2 articles
1 article
available
not available
Based on funding mandates
Co-authors
Farrukh A. Khan, PhDProfessor, King Saud UniversityVerified email at ksu.edu.sa
Thar BakerUniversity of BrightonVerified email at brighton.ac.uk
Syed Atif MoqurrabAssistant Professor at School of Computing, Gachon UniversityVerified email at gachon.ac.kr
Muhammad Zubair FarooqiAALTO University, FinlandVerified email at aalto.fi
Gautam SrivastavaBrandon UniversityVerified email at brandonu.ca
Adeel AnjumInstitute of Information Technology, Quaid-i-Azam University IslamabadVerified email at qau.edu.pk
Feras Al-Obeidat, PhDZayed UniversityVerified email at ca.ibm.com
Ibrahim GhafirUniversity of BradfordVerified email at bradford.ac.uk
Mohammad Hammoudeh, Aramco Cy...King Fahd University of Petroleum and MineralsVerified email at kfupm.edu.sa
"Abdelouahid Derhab"Cybersecurity Professor, King Saud UniversityVerified email at ksu.edu.sa
Sohail AbbasAssociate Professor, University of SharjahVerified email at sharjah.ac.ae
Hissam TawfikProfessor, University of SharjahVerified email at sharjah.ac.ae
Nora FaciUniversité Lyon 1, FranceVerified email at univ-lyon1.fr
Zakaria MaamarUniversity of Doha for Science and Technology, Doha, State of QatarVerified email at udst.edu.qa
AHMED AL-SHAMMAAUniversity of KhorfakkanVerified email at ukf.ac.ae
Joon YooProfessor, School of Computing, Gachon UniversityVerified email at gachon.ac.kr
Amjad AlsirhaniAmjad Alsirhani , Faculty of Computer Sciences and Information, Jouf University, Sakaka, SaudiVerified email at cs.dal.ca
Dr. Hatoon S. AlSagriAssistant Professor, Imam Muhammad Ibn Saud Islamic UniversityVerified email at imamu.edu.sa
Alia AsheralievaLoughborough University, UKVerified email at lboro.ac.uk
Sukhpal Singh GillQueen Mary University of London, UKVerified email at qmul.ac.uk