Get my own profile
Public access
View all4 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Dr. Md Abdur RahmanAssociate Professor of Cyber Security and Forensic Computing Department, University of Prince MugrinVerified email at upm.edu.sa
Imad AfyouniAssistant Professor in Computer ScienceVerified email at sharjah.ac.ae
Emad FelembanFull Professor, Umm Al-Qura UniversityVerified email at uqu.edu.sa
Ahmad Muaz QamarUmm al Qura UniversityVerified email at uqu.edu.sa
Bilal SadiqCEO, Ideal Innovative SolutionsVerified email at 4iisolutions.com
Abdullah MuradDirector of Health Innovation Center - Umm Al-Qura UniversityVerified email at uqu.edu.sa
Ridza WahiddinusimVerified email at usim.edu.my
Sohaib GhaniKing Abdullah University of Science & Technology, KSAVerified email at kaust.edu.sa
Amgad MadkourMicrosoftVerified email at microsoft.com
Walid G. ArefPurdue UniversityVerified email at purdue.edu
Prof. Dr. Abdelmajid KhelilProfessor, CS Department, Landshut UniversityVerified email at haw-landshut.de
Dr. Murtaza Ali KhanFaculty of Computing & IT, Sohar UniversityVerified email at su.edu.om
Sohaib KhanHazen.aiVerified email at hazen.ai
Abdulmotaleb El SaddikMCRLab, University of OttawaVerified email at uottawa.ca
KwangSoo YangFlorida Atlantic UniversityVerified email at fau.edu
Shashi ShekharMcKnight Distinguished University Professor of Computer Science, University of MinnesotaVerified email at umn.edu
Apurv Hirsh ShekharResearch Assistant, Johns Hopkins UniversityVerified email at jhu.edu
Mohamed MokbelDistinguished McKnight University Professor, Comp. Sci. & Eng., Univ. of MinnesotaVerified email at cs.umn.edu
Dr. Akhlaq AhmadCollege of Engineering, Umm Al Qura University, Makkah, KSAVerified email at uqu.edu.sa