-
1
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13by M.I. Khan, Imran Rasheed, M.A. Naeem, Shahbaz Majeed, Ghulam M. Mustafa, Mahvish Fatima, Asif Mahmood, Waheed Al-Masry, Munawar Iqbal, Nessrin A. Kattan, Arif NazirGet full text
Published 2020-07-01
Article -
14Investigation of Chaotic Image Encryption in Spatial and FrFT Domains for Cybersecurity Applicationsby Osama S. Faragallah, Ashraf Afifi, Walid El-Shafai, Hala S. El-Sayed, Ensherah A. Naeem, Mohammed A. Alzain, Jehad F. Al-Amri, Ben Soh, Fathi E. Abd El-SamieGet full text
Published 2020-01-01
Article -
15
-
16by R. A. Pearson, A. Gonzalez-Cordero, E. L. West, J. R. Ribeiro, N. Aghaizu, D. Goh, R. D. Sampson, A. Georgiadis, P. V. Waldron, Y. Duran, A. Naeem, M. Kloc, E. Cristante, K. Kruczek, K. Warre-Cornish, J. C. Sowden, A. J. Smith, R. R. AliGet full text
Published 2016-10-01
Article