Your selections:
A Comprehensive protection method for securing the organization's network against cyberattacks
- Kbar, Ghassan, Alazab, Ammar
A Reinforcement learning based algorithm towards energy efficient 5G Multi-tier network
- Islam, Nahina, Alazab, Ammar, Alazab, Mamoun
An optimal transportation routing approach using GIS-based dynamic traffic flows
- Alazab, Ammar, Venkatraman, Sitalakshmi, Abawajy, Jemal, Alazab, Mamoun
Designing security intelligent agent for petrol theft prevention
- Bakkar, Mahmoud, Alazab, Ammar
GOM: New Genetic Optimizing Model for broadcasting tree in MANET
- Elaiwat, Said, Alazab, Ammar, Venkatraman, Sitalakshmi, Alazab, Mamoun
Information security: Definitions, threats and management in Dubai hospitals context
- Bakkar, Mahmoud, Alazab, Ammar
Maximising competitive advantage on e-Business websites : A data mining approach
- Alazab, Ammar, Bevinakoppa, Savitri, Khraisat, Ansam
Multi-factor based enhancing students' motivations
- Kbar, Ghassan, Alazab, Ammar, Agbinya, Johnson
Are you sure you would like to clear your session, including search history and login status?