Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Associate Prof. Mohammad AlauthmanUniversity of Petra, Faculty of Information TechnologyVerified email at uop.edu.jo
- Ahmad al-QeremZarqa UniversityVerified email at zu.edu.jo
- Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
- Maher AlharbyAssistant Professor at Taibah UniversityVerified email at taibahu.edu.sa
- Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityVerified email at hu.edu.jo
- Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
- Maryam MehrnezhadReader, Information Security Department, Royal Holloway University of London, UKVerified email at rhul.ac.uk
- Ellis SolaimanReader, SFHEA, FBCS, Newcastle UniversityVerified email at ncl.ac.uk
- Roben Castagna LunardiAssociate Professor, Federal Institute of Education, Science and Technology of Rio Grande do SulVerified email at lunardi.inf.br
- Paul EzhilchelvanReader, School of Computing, Newcastle UniversityVerified email at ncl.ac.uk