Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Ahmad al-QeremZarqa UniversityVerified email at zu.edu.jo
Mohammad AlauthmanAssociate Prof. Faculty of Information Technology, University of PetraVerified email at uop.edu.jo
Aad van MoorselProfessor of Computer Science, University of Birmingham, UKVerified email at bham.ac.uk
Maher AlharbyAssociate Professor at Taibah UniversityVerified email at taibahu.edu.sa
Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityVerified email at hu.edu.jo
Changyu DongGuangzhou UniversityVerified email at gzhu.edu.cn
Maryam MehrnezhadReader, Information Security Department, Royal Holloway University of London, UKVerified email at rhul.ac.uk
Ellis SolaimanReader, SFHEA, FBCS, Newcastle UniversityVerified email at ncl.ac.uk
Roben Castagna LunardiAssociate Professor, Federal Institute of Education, Science and Technology of Rio Grande do SulVerified email at lunardi.inf.br
Paul EzhilchelvanReader, School of Computing, Newcastle UniversityVerified email at ncl.ac.uk