Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The theory of multiple stupidities: education, technology and organisation in Arabia., , and . Cogn. Process., 18 (4): 529-541 (2017)A Survey of Intelligent Detection Designs of HTML URL Phishing Attacks., , , , and . IEEE Access, (2023)STUDENTS E-READINESS IN INSTITUTIONS OF THE ROYAL COMMISSION IN JUBAIL, and . International Journal of Advanced Information Technology (IJAIT), 8 (4/5): 15-25 (October 2018)Conti Ransomware Development Evaluation., , and . ACM Southeast Regional Conference, page 39-46. ACM, (2023)An Analysis of Conti Ransomware Leaked Source Codes., , and . IEEE Access, (2022)A Reliable NLP Scheme for English Text Watermarking Based on Contents Interrelationship., , , , , and . Comput. Syst. Sci. Eng., 37 (3): 297-311 (2021)Towards Improving Phishing Detection System Using Human in the Loop Deep Learning Model., , and . ACM Southeast Regional Conference, page 77-85. ACM, (2024)Comprehensive evaluation of skeleton features-based fall detection from Microsoft Kinect v2., , , and . Signal Image Video Process., 13 (7): 1431-1439 (2019)FallFree: Multiple Fall Scenario Dataset of Cane Users for Monitoring Applications Using Kinect., , , and . SITIS, page 327-333. IEEE Computer Society, (2017)The Influence of Smoothing Filtering Methods on the Performance of an EEG-Based Brain-Computer Interface., and . IEEE Access, (2023)