Get my own profile
Public access
View all11 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Prof. Elhadj BenkhelifaProfessor of Computer Science and Artificial Intelligence, Staffordshire University, UK.Verified email at staffs.ac.uk
- Bashar NuseibehThe Open University (UK) & Lero (Ireland)Verified email at open.ac.uk
- cristiano storniLecturer in Interaction Design, University of LimerickVerified email at ul.ie
- Jim BuckleyLecturer, University of LimerickVerified email at ul.ie
- Kaavya RekanarSFI CRTVerified email at ul.ie
- Derek O'KeeffeNational University of Ireland GalwayVerified email at nuigalway.ie
- Liam GlynnGraduate Entry Medical and Health Research Institute, University of LimerickVerified email at ul.ie
- Yaser JararwehComputer Science Department, Jordan University of Science and TechnologyVerified email at just.edu.jo
- Lo'ai TawalbehProf. of Computing and Cyber SecurityVerified email at synopsys.com
- Anas BasalamahAssociate Professor at Umm Al Qura UniversityVerified email at uqu.edu.sa
- Walaa HamoudaProfessor, Concordia University Research Chair in Wireless Communications and Networks, ECE Dept.Verified email at concordia.ca
- Siyakha N MthunziResearcher in Cloud Computing Applications Security. Faculty of Computing, Engineering and SciencesVerified email at research.staffs.ac.uk
- Mahmoud Al-AyyoubAjman UniversityVerified email at ajman.ac.ae
- Abdallah KhreishahNew Jersey Institute of TechnologyVerified email at njit.edu
- Oluwasegun AdedugbeStaffordshire University, United KingdomVerified email at staffs.ac.uk
- Adeyinka OdebadeResearcherVerified email at research.staffs.ac.uk