Crea il mio profilo
Accesso pubblico
Visualizza tutto11 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Prof. Elhadj BenkhelifaProfessor of Computer Science and Artificial Intelligence, Staffordshire University, UK.Email verificata su staffs.ac.uk
- Bashar NuseibehThe Open University (UK) & Lero (Ireland)Email verificata su open.ac.uk
- cristiano storniLecturer in Interaction Design, University of LimerickEmail verificata su ul.ie
- Jim BuckleyLecturer, University of LimerickEmail verificata su ul.ie
- Kaavya RekanarSFI CRTEmail verificata su ul.ie
- Derek O'KeeffeNational University of Ireland GalwayEmail verificata su nuigalway.ie
- Liam GlynnGraduate Entry Medical and Health Research Institute, University of LimerickEmail verificata su ul.ie
- Yaser JararwehComputer Science Department, Jordan University of Science and TechnologyEmail verificata su just.edu.jo
- Lo'ai TawalbehProf. of Computing and Cyber SecurityEmail verificata su synopsys.com
- Anas BasalamahAssociate Professor at Umm Al Qura UniversityEmail verificata su uqu.edu.sa
- Walaa HamoudaProfessor, Concordia University Research Chair in Wireless Communications and Networks, ECE Dept.Email verificata su concordia.ca
- Siyakha N MthunziResearcher in Cloud Computing Applications Security. Faculty of Computing, Engineering and SciencesEmail verificata su research.staffs.ac.uk
- Mahmoud Al-AyyoubAjman UniversityEmail verificata su ajman.ac.ae
- Abdallah KhreishahNew Jersey Institute of TechnologyEmail verificata su njit.edu
- Oluwasegun AdedugbeStaffordshire University, United KingdomEmail verificata su staffs.ac.uk
- Adeyinka OdebadeResearcherEmail verificata su research.staffs.ac.uk