Author of the publication

An Overview of Funded Research Projects in The MENA Region on Intelligent Transportation Systems.

, , , , , , , , and . IWCMC, page 313-320. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Predicting Patients' Health Behavior Based on Their Privacy Preferences., , , and . AICCSA, page 1-8. IEEE Computer Society, (2019)Resolving Conflicting Privacy Policies in M-health based on Prioritization., and . Scalable Comput. Pract. Exp., 17 (3): 207-226 (2016)Preserving Privacy in Mobile Crowdsensing within Intelligent Transportation System: Current Research and Future Challenges., , , , , and . IWCMC, page 307-312. IEEE, (2023)Toward Third-Party Immune Applications., and . MMM-ACNS, volume 10446 of Lecture Notes in Computer Science, page 348-359. Springer, (2017)State of the art of Trust and Reputation Systems in E-Commerce Context., and . CoRR, (2017)Proximity Measurement for Hierarchical Categorical Attributes in Big Data., , and . Secur. Commun. Networks, (2021)A Comparative Study on Access Control Models and Security Requirements in Workflow Systems., and . IBICA, volume 735 of Advances in Intelligent Systems and Computing, page 361-373. Springer, (2017)A Classification of non-Cryptographic Anonymization Techniques Ensuring Privacy in Big Data., and . Int. J. Commun. Networks Inf. Secur., (2020)Automated Security Driven Solution for Inter-Organizational Workflows., and . HIS, volume 1179 of Advances in Intelligent Systems and Computing, page 350-361. Springer, (2019)A New Task Engineering Approach for Workflow Access Control., , and . CISIS, volume 85 of Advances in Intelligent and Soft Computing, page 203-212. Springer, (2010)