Author of the publication

Modelling the utilization of cloud health information systems in the Iraqi public healthcare sector.

, , , , , , , , and . Telematics Informatics, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review on Electronic Payments Security., , , and . Symmetry, 12 (8): 1344 (2020)An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things., , , , and . IEEE Access, (2023)Binary nonogram puzzle based data hiding technique for data security., , , , and . Multim. Tools Appl., 83 (2): 4951-4992 (January 2024)DVAEGMM: Dual Variational Autoencoder With Gaussian Mixture Model for Anomaly Detection on Attributed Networks., , , , , , and . IEEE Access, (2022)Lightweight Encryption Technique to Enhance Medical Image Security on Internet of Medical Things Applications., , , , , , , , , and 1 other author(s). IEEE Access, (2021)Optimized Visual Internet of Things for Video Streaming Enhancement in 5G Sensor Network Devices., , , , , and . Sensors, 23 (11): 5072 (2023)Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform., , , and . CoRR, (2021)High-Speed Network DDoS Attack Detection: A Survey., , , , , , and . Sensors, 23 (15): 6850 (August 2023)Penetration Testing for IoT Security: The Case Study of a Wireless IP Security CAM., , , , and . ICAIC, page 1-5. IEEE, (2023)Cyber Security Threats on Digital Banking., , , , , , and . ICAIC, page 1-4. IEEE, (2022)