Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Classification of trust in Peer-to-Peer (P2P) communication., , and . Comput. Syst. Sci. Eng., (2004)Software as a Service (SaaS) Service Selection Based on Measuring the Shortest Distance to the Consumer's Preferences., and . EIDWT, volume 17 of Lecture Notes on Data Engineering and Communications Technologies, page 403-415. Springer, (2018)Survey on Intelligent Chatbots: State-of-the-Art and Future Research Directions., and . CISIS, volume 993 of Advances in Intelligent Systems and Computing, page 534-543. Springer, (2019)Towards a Public Cloud Services Registry., , , , , and . WISE (1), volume 10569 of Lecture Notes in Computer Science, page 290-295. Springer, (2017)Barriers to Blockchain Adoption by Saudi Higher Education Institutions: A Structural Equation Analysis., , and . NBiS, volume 183 of Lecture Notes on Data Engineering and Communications Technologies, page 52-61. Springer, (2023)Profile-Based Viable Service Level Agreement (SLA) Violation Prediction Model in the Cloud., , , and . 3PGCIC, page 268-272. IEEE Computer Society, (2015)Application of Protégé and SPARQL in the Field of Project Knowledge Management., , and . ICSNC, page 74. IEEE Computer Society, (2007)A Framework for User Feedback Based Cloud Service Monitoring., , , and . CISIS, page 257-262. IEEE Computer Society, (2012)Trust-Based Authentication for Secure Communication in Cognitive Radio Networks., , , and . EUC, page 589-596. IEEE Computer Society, (2010)Digital signature-based authentication framework in cognitive radio networks., , and . MoMM, page 136-142. ACM, (2012)