Get my own profile
Public access
View all1 article
1 article
available
not available
Based on funding mandates
Co-authors
- Steve DrewSenior Lecturer, Tasmanian Institute of Learning and TeachingVerified email at utas.edu.au
- Dr. Mohammed Alshehri (M. Alshehri)Associate Professor, IT Department, College of Computer and Information Sciences, Majmaah UniversityVerified email at mu.edu.sa
- Thamer AlhussainProfessor of ITVerified email at seu.edu.sa
- Salem AlkhalafComputer Department, College of Science and Arts in Al-Rass, Qassim UniversityVerified email at qu.edu.sa
- Adel BahaddadAss Prof. , King Abdulaziz UniversityVerified email at kau.edu.sa
- OSAMA ALFARRAJComputer Sciences Department, RCC, KSUVerified email at ksu.edu.sa
- Abdulmohsen AlmalawiAssociate Professor of Computer Science, King Abdul Aziz UniversityVerified email at kau.edu.sa
- Syed Adnan YusufHitachi EuropeVerified email at hitachi-eu.com
- Seyed Mohamed BuhariUniversiti Teknologi BruneiVerified email at utb.edu.bn
- Professor Zahir TariResearch Director, RMIT Cyber Security Centre, RMIT University, School of Computing TechnologiesVerified email at rmit.edu.au
- Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
- Adil FahadAl Baha UniversityVerified email at bu.edu.sa
- Luke HoughtonAssociate Professor, Griffith UniversityVerified email at griffith.edu.au
- Nabeel AlbishryKing Abdulaziz UniversityVerified email at kau.edu.sa
- Mohammed BasheriKing Abdulaziz UniversityVerified email at kau.edu.sa
- Dr. Wajid AzizDepartment of Computer Science & Information Technology, University of Azad Jammu & KashmirVerified email at ajku.edu.pk