Open Access
ARTICLE
Fatma S. Alrayes1, Mohammed Zakariah2, Syed Umar Amin3,*, Zafar Iqbal Khan3, Jehad Saad Alqurni4
1 Information Systems Department, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, Riyadh, 11671, Saudi Arabia
2 College of Computer and Information Sciences, King Saud University, Riyadh, 11362, Saudi Arabia
3 College of Computer and Information Sciences, Prince Sultan University, Riyadh, 11586, Saudi Arabia
4 Department of Educational Technologies, College of Education, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
* Corresponding Author: Syed Umar Amin. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.051996
Received 20 March 2024; Accepted 05 June 2024; Published online 09 July 2024
View
Download
Like
New Method for Computer Identification Through Electromagnetic Radiation
Jun Shi, Zhujun Zhang, Yangyang...Expression Preserved Face Privacy Protection Based on Multi-mode Discriminant Analysis
Xiang Wang, Chen Xiong, Qingqi...RETRACTED: Mitigating Content Caching Attack in NDN
Zhiqiang Ruan, Haibo Luo, Wenzhong...Provably Secure APK Redevelopment Authorization Scheme in the Standard Model
Daofeng Li, Mingxing Luo, Bowen...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...