Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Software Defect Prediction Using Ensemble Learning: A Systematic Literature Review., , , , , , , and . IEEE Access, (2021)Quality Requirement Change Management's Challenges: An Exploratory Study Using SLR., , , , , , and . IEEE Access, (2022)A Roadmap for SMEs to Adopt an AI Based Cyber Threat Intelligence., , , , , , and . The Effect of Information Technology on Business and Marketing Intelligence Systems, volume 1056 of Studies in Computational Intelligence, Springer, (2023)IT Governance Framework and Smart Services Integration for Future Development of Dubai Infrastructure Utilizing AI and Big Data, Its Reflection on the Citizens Standard of Living., , , , , and . AICV, volume 1377 of Advances in Intelligent Systems and Computing, page 235-247. Springer, (2021)Combating Against Potentially Harmful Mobile Apps., , , and . AICV, volume 1377 of Advances in Intelligent Systems and Computing, page 154-173. Springer, (2021)Integrating BLE Beacon Technology with Intelligent Information Systems IIS for Operations' Performance: A Managerial Perspective., , and . AICV, volume 1377 of Advances in Intelligent Systems and Computing, page 527-538. Springer, (2021)RTA's Employees' Perceptions Toward the Efficiency of Artificial Intelligence and Big Data Utilization in Providing Smart Services to the Residents of Dubai., , , , , and . AICV, volume 1377 of Advances in Intelligent Systems and Computing, page 573-585. Springer, (2021)Detect Phishing Website by Fuzzy Multi-Criteria Decision Making., , , , , and . ICAIC, page 1-8. IEEE, (2022)Securing Smart Cities Using Blockchain Technology., , , , , , , and . ICAIC, page 1-4. IEEE, (2022)Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics., , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 84-88. IEEE, (2023)