Search for persons
X
?
2020 International Conference on Cyber Warfare and Security (ICCWS) ,
1
Identifying Mirai-Exploitable Vulnerabilities in IoT Firmwa..:
, In:
?
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) ,
2
An Auditing Framework for Vulnerability Analysis of IoT Sys..:
, In:
?
2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC) ,
4
Deep Radiomics: A Picture's Worth a Thousand Words - A Revi..:
, In:
?
2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC) ,
5
Investigating Bigdata Analytics Adoption in Higher Educatio..:
, In:
?
2024 IEEE 1st Karachi Section Humanitarian Technology Conference (KHI-HTC) ,
6
A Conceptual Framework For Determinants Of The Student Advi..:
, In:
?
2023 IEEE 8th International Conference on Engineering Technologies and Applied Sciences (ICETAS) ,
8
3D Hologram in Education to Enhance the Learning Power of S..:
, In:
?
2023 IEEE 8th International Conference on Engineering Technologies and Applied Sciences (ICETAS) ,
9
Overlapped Symptoms Detection for Cardiovascular Disease Ba..:
, In:
?
2023 IEEE 8th International Conference on Engineering Technologies and Applied Sciences (ICETAS) ,
11
Detection And Discrimination Of Cracked Digitized Paintings..:
, In:
?
2023 IEEE 8th International Conference on Engineering Technologies and Applied Sciences (ICETAS) ,
12
Deploying Blockchains to Simplify AI Algorithm Auditing:
, In:
?
2023 IEEE 8th International Conference on Engineering Technologies and Applied Sciences (ICETAS) ,
13
A Conceptual Framework for Determinants of Customer Satisfa..:
, In:
?
2023 IEEE 8th International Conference on Engineering Technologies and Applied Sciences (ICETAS) ,
14
Information Quality for Mobile Application Development to A..:
, In:
?
2023 IEEE 8th International Conference on Engineering Technologies and Applied Sciences (ICETAS) ,
15