Get my own profile
Public access
View all3 articles
7 articles
available
not available
Based on funding mandates
Co-authors
- Yu ZhuangTexas Tech UniversityVerified email at ttu.edu
- Abdur Rashid SangiFaculty MemberVerified email at kean.edu
- satish anamalamudiSRM University-AP, AmaravatiVerified email at srmap.edu.in
- Mohammed A. AlqarniAssociate Professor, Software Engineering Dept., University of JeddahVerified email at uj.edu.sa
- Dr. Chauhdary Sajjad HussainAssociate Professor-University of JeddahVerified email at uj.edu.sa
- Khalid T. MursiAssistant Professor, College of Computer Science and Engineering, University of Jeddah, Saudi ArabiaVerified email at uj.edu.sa
- Muhammad Murtaza KhanNational University of Sciences and TechnologyVerified email at seecs.edu.pk
- Meznah A. AlamroIT Department, College of Computer & Information Sciences, Princess Nourah UniversityVerified email at pnu.edu.sa
- Sajid SaleemUniversity of Jeddah, Jeddah, KSAVerified email at uj.edu.sa
- Ali Kashif Bashir, PhD, SMIEEE.Professor at Manchester Metropolitan University, UK; Clarivate Highly Cited ResearcherVerified email at ieee.org
- Jalal S. AlowibdiAssociate Professor at University of JeddahVerified email at uj.edu.sa
- Muhammad Khurram Khan[King Saud University, Saudi Arabia] [Founder/CEO, Global Foundation for Cyber Studies and Research]Verified email at ksu.edu.sa
- Mohamed H. EldefrawyThe School of Information Technology, Halmstad University, Sweden.Verified email at hh.se