Mezaal, Yaqeen S.; Hammood, Dalal A.; Ali, Mohammed H.
(IEEE, 2016)
With continuous development of hacking technologies, it is necessary to provide users with a protected background that secures their resources against unlawful access by enforcing control mechanisms. To neutralize such ...