Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Associate Prof. Mohammad AlauthmanUniversity of Petra, Faculty of Information TechnologyVerified email at uop.edu.jo
Ahmad al-QeremZarqa UniversityVerified email at zu.edu.jo
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Maher AlharbyAssociate Professor at Taibah UniversityVerified email at taibahu.edu.sa
Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityVerified email at hu.edu.jo
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Maryam MehrnezhadReader, Information Security Department, Royal Holloway University of London, UKVerified email at rhul.ac.uk
Ellis SolaimanReader (Professor), SFHEA, FBCS, Newcastle UniversityVerified email at ncl.ac.uk
Roben Castagna LunardiAssociate Professor, Federal Institute of Education, Science and Technology of Rio Grande do SulVerified email at lunardi.inf.br
Paul EzhilchelvanReader, School of Computing, Newcastle UniversityVerified email at ncl.ac.uk