Open Access
ARTICLE
Nisreen Innab1, Ahmed Abdelgader Fadol Osman2, Mohammed Awad Mohammed Ataelfadiel2, Marwan Abu-Zanona3,*, Bassam Mohammad Elzaghmouri4, Farah H. Zawaideh5, Mouiad Fadeil Alawneh6
1 Department of Computer Science and Information Systems, College of Applied Sciences, Almaarefa University, Diriyah, Riyadh, 13713, Saudi Arabia
2 Applied College, King Faisal University, Al-Ahsa, 31982, Saudi Arabia
3 Department of Management Information Systems, College of Business Administration, King Faisal University, Al-Ahsa, 31982, Saudi Arabia
4 Department of Computer Science, Faculty of Computer Science and Information Technology, Jerash University, Jerash, 26110, Jordan
5 Department of Business Intelligence and Data Analysis, Faculty of Financial Sciences and Business, Irbid National University, Irbid, 21110, Jordan
6 Faculty of Information Technology, Ajloun National University, Ajloun, 26767, Jordan
* Corresponding Author: Marwan Abu-Zanona. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.051778
Received 15 March 2024; Accepted 03 June 2024; Published online 08 July 2024
View
Download
Like
New Method for Computer Identification Through Electromagnetic Radiation
Jun Shi, Zhujun Zhang, Yangyang...RETRACTED: Mitigating Content Caching Attack in NDN
Zhiqiang Ruan, Haibo Luo, Wenzhong...Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
Daofeng Li, Mingxing Luo, Bowen...An Improved Memory Cache Management Study Based on Spark
Suzhen Wang, Yanpiao Zhang, Lu...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...