Works matching IS 27697851 AND DT 2025 AND VI 15 AND IP 2
1
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 244, doi. 10.54216/JCIM.150219
- Sibe, Robinson Tombari;
- Idigbo, Blossom U.
- Article
2
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 43, doi. 10.54216/JCIM.150205
- Hassen, Oday Ali;
- Majeed, Huda Lafta;
- Hussein, Mohammed Abdulhasan;
- Darwish, Saad M.;
- Al-Boridi, Omar
- Article
3
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 115, doi. 10.54216/JCIM.150210
- Anitha, K.;
- Gandhi, K. Rajiv
- Article
4
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 27, doi. 10.54216/JCIM.150203
- Salman, Assel Hashim;
- Ibrahim, Abdullahi Abdu
- Article
5
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 322, doi. 10.54216/JCIM.150224
- Abbas, Noor Ali;
- Mahdi, Muhammed Abaid;
- Salman, Mahdi Abed
- Article
6
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 305, doi. 10.54216/JCIM.150223
- Mohammed, Sundws M.;
- Madaan, Vijay;
- Resen, Rajaa Daami;
- Sharma, Neha;
- Hassen, Oday Ali;
- khmadhloom, Jamal
- Article
7
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 87, doi. 10.54216/JCIM.150208
- Abdulkader, Omar Ahmed;
- Ikram, Muhammad Jawad
- Article
8
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 208, doi. 10.54216/JCIM.150216
- Abou-Elasaad, Mounir Mohammad;
- Sayed, Samir G.;
- El-Dakroury, Mohamed M.
- Article
9
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 131, doi. 10.54216/JCIM.150211
- Article
10
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 285, doi. 10.54216/JCIM.150221
- Madeeh, Omar Dhafer;
- Abduljabbar, Osamah M.;
- Lateef, Huda Mohammed
- Article
11
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 17, doi. 10.54216/JCIM.150202
- Mohammed, Osama;
- Ibrahim, Marwa;
- Ataalla, Abdalrahman Fatikhan
- Article
12
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 225, doi. 10.54216/JCIM.150217
- Jasim, Amenah A.;
- Ali Alheeti, Khattab M.
- Article
13
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 195, doi. 10.54216/JCIM.150215
- Abou-Elasaad, Mounir Mohammad;
- Sayed, Samir G.;
- El-Dakroury, Mohamed M.
- Article
14
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 177, doi. 10.54216/JCIM.150214
- AlHamdani, Teba Hassan;
- Ali, Suhad A.;
- Jawad, Majid Jabbar
- Article
15
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 147, doi. 10.54216/JCIM.150212
- Article
16
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 78, doi. 10.54216/JCIM.150207
- Shareef, Ammar Nadal;
- Shaalan, Amer Basim;
- Naeem, Hayder Salah;
- Albdairi, Mustafa
- Article
17
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 331, doi. 10.54216/JCIM.150225
- Ahmed, Israa Shihab;
- Ahmed, Ahmed Luay;
- Kamalrudin, Massila;
- Musa, Mustafa
- Article
18
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 260, doi. 10.54216/JCIM.150220
- Al Sukhni, Hassan;
- Sakr, Fatma;
- Salem Al jawazneh, Fadi yassin;
- Alsmadi, Mutasem K.;
- Abd-Elghany, Magdy;
- Gomaa, Ibrahim A.;
- Abdallah, Shaimaa
- Article
19
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 65, doi. 10.54216/JCIM.150206
- Arockiam, Daniel;
- Abdullah, Azween;
- Raju, Valliappan
- Article
20
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 35, doi. 10.54216/JCIM.150204
- Shahadha, Raya Sattar;
- Al-Khateeb, Belal
- Article
21
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 1, doi. 10.54216/JCIM.150201
- Arévalo Gamboa, Lissett Margarita;
- León-Batallas, Alberto;
- Ortiz-Mata, Jhonny;
- Mendoza-Cabrera, Denis
- Article
22
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 100, doi. 10.54216/JCIM.150209
- Article
23
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 293, doi. 10.54216/JCIM.150222
- Majeed, Huda Lafta;
- Alomari, Esraa Saleh;
- Yousif, Ali Nafea;
- Hassen, Oday Ali;
- Darwish, Saad M.;
- Gromov, Yu Yu
- Article
24
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 165, doi. 10.54216/JCIM.150213
- Shravani, Yerraginnela;
- Ashesh K.
- Article
25
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 2, p. 233, doi. 10.54216/JCIM.150218
- Obaid, Zaid M.;
- Ali Alheeti, Khattab M.
- Article