Works matching IS 27697851 AND DT 2025 AND VI 16 AND IP 1
1
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 282, doi. 10.54216/JCIM.160120
- Metawa, Noura;
- Afchal, Sally;
- El-Kanj, Nasser
- Article
2
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 269, doi. 10.54216/JCIM.160119
- Article
3
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 252, doi. 10.54216/JCIM.160118
- T. A., Mohanaprakash;
- M., Muthalakshmi;
- A., Vijaya;
- S., Selvakumari;
- Ajitha, E.;
- P., Naveen
- Article
4
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 243, doi. 10.54216/JCIM.160117
- Harika, Thippireddy;
- Pradeepini, Gera
- Article
5
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 231, doi. 10.54216/JCIM.160116
- Mashhadani, Shahlaa;
- Mohammed, Rajaa Mrayeh;
- Jatana, Nishtha;
- Gupta, Charu;
- Hassen, Oday Ali;
- Jindal, Shweta
- Article
6
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 208, doi. 10.54216/JCIM.160115
- Majeed, Huda Lafta;
- Hassen, Oday Ali;
- Farhan, Dhyeauldeen Ahmed;
- Gromov, Yu Yu;
- Sheoran, Kavita;
- Dhand, Geetika
- Article
7
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 176, doi. 10.54216/JCIM.160114
- Naguib, Ahmed;
- Aslan, Haba K.;
- Fouad, Khaled M.
- Article
8
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 162, doi. 10.54216/JCIM.160113
- Hassn, Baraa Mohammed;
- Alomari, Esraa Saleh;
- Alrubaye, Jaafar Sadiq;
- Hassen, Oday Ali
- Article
9
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 151, doi. 10.54216/JCIM.160112
- Salman, Rasha Hani;
- Abdul Wahab, Hala Bahjat
- Article
10
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 134, doi. 10.54216/JCIM.160111
- Mary, A. Jeneba;
- Kuppusamy, K.;
- Senthilrajan, A.
- Article
11
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 120, doi. 10.54216/JCIM.160110
- El-kenawy, El-Sayed M.;
- Alhussan, Amel Ali;
- Khafaga, Doaa Sami;
- Alharbi, Amal H.;
- Alzakari, Sarah A.;
- Abdelhamid, Abdelaziz A.;
- Ibrahim, Abdelhameed;
- Eid, Marwa M.
- Article
12
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 107, doi. 10.54216/JCIM.160109
- Tharageswari, K.;
- Sundaram, N. Mohana;
- Santhosh, R.
- Article
13
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 99, doi. 10.54216/JCIM.160108
- Mahmood, Sawsan D.;
- Saleh, Hadeel M.;
- Youssef, Asraa Y.;
- Ghasab Almashagba, Lara Ahmad;
- Al Abri, Fathiya
- Article
14
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 86, doi. 10.54216/JCIM.160107
- Article
15
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 68, doi. 10.54216/JCIM.160106
- Thati, Balamuralikrishna;
- Koppolu, Ravi Kiran;
- Kumar, D. Lokesh Sai;
- Nagamani, Tenali;
- Muthukumar, P.;
- Lalitha, S.
- Article
16
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 53, doi. 10.54216/JCIM.160105
- Sharma, Neha;
- Kajal, Abhishek
- Article
17
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 38, doi. 10.54216/JCIM.160104
- Asiedu, Daniel;
- Mensah, Patrick Kwabena;
- Appiahene, Peter;
- Nimbe, Peter
- Article
18
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 25, doi. 10.54216/JCIM.160103
- Rao, Songa Venkata;
- Prajna, Bodapati
- Article
19
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 15, doi. 10.54216/JCIM.160102
- Nugraha, Anggit Ferdita;
- Pristyanto, Yoga;
- Wulansari, Beti;
- Prasetya, Dian
- Article
20
- Journal of Cybersecurity & Information Management, 2025, v. 16, n. 1, p. 1, doi. 10.54216/JCIM.160101
- Al-Doori, Mohammed B.;
- Ali Alheeti, Khattab M.
- Article