Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Dr. Md Abdur RahmanAssociate Professor of Cyber Security and Forensic Computing Department, University of Prince MugrinVerified email at upm.edu.sa
- Imad AfyouniAssistant Professor in Computer ScienceVerified email at sharjah.ac.ae
- Emad FelembanFull Professor, Umm Al-Qura UniversityVerified email at uqu.edu.sa
- Ahmad Muaz QamarUmm al Qura UniversityVerified email at uqu.edu.sa
- Bilal SadiqCEO, Ideal Innovative SolutionsVerified email at 4iisolutions.com
- Abdullah MuradDirector of Health Innovation Center - Umm Al-Qura UniversityVerified email at uqu.edu.sa
- Ridza WahiddinusimVerified email at usim.edu.my
- Sohaib GhaniKing Abdullah University of Science & Technology, KSAVerified email at kaust.edu.sa
- Amgad MadkourMicrosoftVerified email at microsoft.com
- Walid G. ArefPurdue UniversityVerified email at purdue.edu
- Prof. Dr. Abdelmajid KhelilProfessor, CS Department, Landshut UniversityVerified email at haw-landshut.de
- Dr. Murtaza Ali KhanFaculty of Computing & IT, Sohar UniversityVerified email at su.edu.om
- Sohaib KhanHazen.aiVerified email at hazen.ai
- Abdulmotaleb El SaddikMCRLab, University of OttawaVerified email at uottawa.ca
- KwangSoo YangFlorida Atlantic UniversityVerified email at fau.edu
- Shashi ShekharMcKnight Distinguished University Professor of Computer Science, University of MinnesotaVerified email at umn.edu
- Apurv Hirsh ShekharResearch Assistant, Johns Hopkins UniversityVerified email at jhu.edu
- Mohamed MokbelDistinguished McKnight University Professor, Comp. Sci. & Eng., Univ. of MinnesotaVerified email at cs.umn.edu
- Dr. Akhlaq AhmadCollege of Engineering, Umm Al Qura University, Makkah, KSAVerified email at uqu.edu.sa