Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
HUDA ADIBAH MOHD RAMLIIIUMVerified email at iium.edu.my
Ahmad Fadzil IsmailLecturer / Researcher, International Islamic University MalaysiaVerified email at iium.edu.my
MOHAMED HADI HABAEBI .Electrical and Computer Engineering Department, International Islamic University MalaysiaVerified email at iium.edu.my
Md. Arafatur RahmanReader in Cyber Security, School of Mathematics and Computer Science, University of WolverhamptonVerified email at wlv.ac.uk
Akram M. Zeki[email protected]Verified email at iium.edu.my
Mistura Laide SanniObafemi Awolowo University Nigeria, International Islamic University MalaysiaVerified email at oauife.edu.ng
Saiful Azad, PhDProfessor, Department of Computer Science and Engineering, Green University of BangladeshVerified email at cse.green.edu.bd
Hymie Abd-LatifOtago PolytechnicVerified email at op.ac.nz
Zeldi SuryadySenior Researcher, MIMOS Berhad MalaysiaVerified email at mimos.my
Abiodun Musa AibinuSummit University, Offa, Kwara State, NigeriaVerified email at summituniversity.edu.ng