Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Sakib ShahriarUniversity of GuelphEmail verificata su uoguelph.ca
- Sujith Samuel MathewAssociate Professor, Zayed UniversityEmail verificata su zu.ac.ae
- Zouheir TrabelsiProfessor of Information Security, College of IT, UAE UniversityEmail verificata su uaeu.ac.ae
- Mohammad M. MasudProfessor, College of Information Technology, United Arab Emirates UniversityEmail verificata su uaeu.ac.ae
- Mohamed Adel SerhaniCollege of Computing and Informatics, University of SharjahEmail verificata su sharjah.ac.ae
- Hany AlashwalAssociate Professor at the College of Information Technology, United Arab Emirates UniversityEmail verificata su uaeu.ac.ae
- Asad Waqar MalikPost Doctoral Fellow, Intelligent Systems Center, Missouri University of Science and Technology, USAEmail verificata su mst.edu
- E.AlothaliPhD, CIT, UAEUEmail verificata su uaeu.ac.ae
- Pin-Han HoUniversity of WaterlooEmail verificata su uwaterloo.ca
- Tariq QayyumUnited Arab Emirates University (UAEU)Email verificata su seecs.edu.pk
- Ikbal TalebCTI-ISTM, Zayed University, Abu Dhabi / CIISE Concordia University, MontrealEmail verificata su zu.ac.ae
- Mohammed Golam KaosarSenior Lecturer, Murdoch UniversityEmail verificata su murdoch.edu.au
- Neethu VenugopalZayed UniversityEmail verificata su zu.ac.ae
- Imran MakhdoomNUST (Pak), University of Technology Sydney (Aus)Email verificata su uts.edu.au
- Ezedin BarkaAssociate Professor and Chair- Dept. of Information Systems and Security, UAEUEmail verificata su uaeu.ac.ae
- Limei PengKyungpook National University, South KoreaEmail verificata su knu.ac.kr
- Remi VenantUniversity of ToulouseEmail verificata su irit.fr
- Mohammad Amin KuhailAssociate Professor, Zayed UniversityEmail verificata su zu.ac.ae