Author of the publication

Exploring Cyber Investigators: An In-Depth Examination of the Field of Digital Forensics.

, , , , and . DASC/PiCom/CBDCom/CyberSciTech, page 84-88. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Quality Requirement Change Management's Challenges: An Exploratory Study Using SLR., , , , , , and . IEEE Access, (2022)Software Defect Prediction Using Ensemble Learning: A Systematic Literature Review., , , , , , , and . IEEE Access, (2021)Detecting Electrocardiogram Arrhythmia Empowered With Weighted Federated Learning., , , , , , and . IEEE Access, (2024)Deep Sentiments Analysis for Roman Urdu Dataset Using Faster Recurrent Convolutional Neural Network Model., , , , , and . Appl. Artif. Intell., (December 2022)A secure healthcare 5.0 system based on blockchain technology entangled with federated learning technique., , , , , and . Comput. Biol. Medicine, (2022)Weather Satellite Tracking with RTL-SDR: NOAA 15 Image Reception and Signal Decoding., , , , , and . ICCR, page 1-7. IEEE, (2024)Detect Phishing Website by Fuzzy Multi-Criteria Decision Making., , , , , and . ICAIC, page 1-8. IEEE, (2022)Securing Smart Cities Using Blockchain Technology., , , , , , , and . ICAIC, page 1-4. IEEE, (2022)A Roadmap for SMEs to Adopt an AI Based Cyber Threat Intelligence., , , , , , and . The Effect of Information Technology on Business and Marketing Intelligence Systems, volume 1056 of Studies in Computational Intelligence, Springer, (2023)Combating Against Potentially Harmful Mobile Apps., , , and . AICV, volume 1377 of Advances in Intelligent Systems and Computing, page 154-173. Springer, (2021)