Master Thesis Faculty of Information Technology
| Name | Year | Faculty | Majors | Dowload |
|---|---|---|---|---|
| Task Scheduling Using Best-Level-Job-First on Private Cloud Computing | 2016 | Information Technology | Computer Science | Download |
| A Method for Static Video Summarization for Reducing Power Consumption and Its Impact on Bandwidth | 2016 | Information Technology | Computer Science | Download |
| Image Encryption System by Generating Chains from the Secret Key | 2016 | Information Technology | Computer Science | Download |
| Performance Analysis for Fully and Partially Homomorphic Encryption Techniques | 2016 | Information Technology | Computer Science | Download |
| A Comparative Study of Classification Techniques for English to Arabic Speech Recognition | 2016 | Information Technology | Computer Information Systems | Download |
| A New Statistical Anomaly Detector Model for Keystroke Dynamics on Touch Mobile Devices | 2016 | Information Technology | Computer Science | Download |
| The Hiding of Multimedia Secret Files in Dual RGB Cover Images Using LSB Steganography Techniques | 2016 | Information Technology | Computer Science | Download |
| Developing Parallel Technique for the Internet of Things Devices by using local Map Reduce at the sink node. | 2016 | Information Technology | Computer Science | Download |
| Analytical Study for the Mutable Order-Preserving Encoding with Periodically Encryption Key Changing | 2016 | Information Technology | Computer Science | Download |
| Investigation on Order-Preserving Encryption for Database in Cloud Computing | 2016 | Information Technology | Computer Science | Download |
| Applying the Kinect Device for Human Identification System in the ATM Environment | 2016 | Information Technology | Computer Science | Download |
| A Customer - Oriented Software Development Life Cycle | 2008 | Information Technology | Computer Science | Download |
| A Decision Support System for E-banking Adoption in Jordan : A Critical Success Factors Perspective | 2008 | Information Technology | Computer Information Systems | Download |
| A Generic Menu - Based Interface for Web Querying | 2008 | Information Technology | Computer Information Systems | Download |
| A Model For Designing And Adapting Mobile Learning Content | 2008 | Information Technology | Computer Information Systems | Download |
| An Intelligent Face Authentication System for ATM aAccess | 2008 | Information Technology | Computer Science | Download |
| Design Secure E-Voting Scheme | 2008 | Information Technology | Computer Science | Download |
| Embedding Hex-Cells into Tree- Hybercube Network | 2008 | Information Technology | Computer Science | Download |
| Towards An Ontology for Software Product Quality Attributes | 2009 | Information Technology | Computer Information Systems | Download |
| A Model For E-Learning Content Design | 2009 | Information Technology | Computer Information Systems | Download |
| A Multi-Layer Perceptron neural network Based -model for Face Detection | 2009 | Information Technology | Computer Science | Download |
| design and implementation of mobile learning content model | 2009 | Information Technology | Computer Information Systems | Download |
| Designing A Secure E- Payment protocol | 2009 | Information Technology | Computer Science | Download |
| Towards Ontology For Reguirements Engineering process in E-Government Application | 2008 | Information Technology | Computer Information Systems | Download |
| Deriving System Model From Business Process Model (JCR Case Study) | 2009 | Information Technology | Computer Information Systems | Download |
| A knowledge based system for developing cognitive map based on geographical map | 2011 | Information Technology | Computer Science | Download |
| A model for Outsourcing Monitoring System | 2010 | Information Technology | Computer Science | Download |
| A Robust Framework for Watermarking System | 2010 | Information Technology | Computer Information Systems | Download |
| Database fragmentation Technque for News Websites | 2009 | Information Technology | Computer Information Systems | Download |
| Design A Model for Dynamic workflow Management System | 2010 | Information Technology | Computer Information Systems | Download |
| Designing A model for Wireless Load Data Sheet in Aircraft | 2010 | Information Technology | Computer Information Systems | Download |
| Developing a Payment System Using Contactless Smart card | 2010 | Information Technology | Computer Information Systems | Download |
| mouse Gestural hindi Digits Recopgnition Using Neural Network | 2010 | Information Technology | Computer Science | Download |
| THE VERIFICATION FROM THE CITIZEN IN E-GOVERNMENT APPLICATION | 2010 | Information Technology | Computer Information Systems | Download |
| Using Architectural Blueprints for Intelligent Robot Cognitive Mapping as a Knowledge-based system | 2010 | Information Technology | Computer Information Systems | Download |
| A secure electronic voting scheme based on evox-MA and revs voting blind signature protocols | 2011 | Information Technology | Computer Science | Download |
| an efficient digital image watermarking system based on contourlet transform and discrete wavelet transform | 2011 | Information Technology | Computer Science | Download |
| Anonymous and non-repudiation E-cash scheme based on partially blind sigature | 2011 | Information Technology | Computer Science | Download |
| artifical neuro-fuzzy logic system human emotions | 2011 | Information Technology | Computer Science | Download |
| desigen of intelligent database system for vehicle fault diagnosis | 2011 | Information Technology | Computer Science | Download |
| intrusion detection model inspired by immune using k-means and naive bayes as hybrid learning approach | 2012 | Information Technology | Computer Science | Download |
| A comparative study of duplicate record detection techniques | 2012 | Information Technology | Computer Science | Download |
| A Hybrid statistical and morphological arabic language diacritizing system | 2012 | Information Technology | Computer Science | Download |
| A Knowledge acquisition framework in trace - based reasoning for valuing knowledge | 2012 | Information Technology | Computer Science | Download |
| A Proposed software description language for representing program logic in XML | 2012 | Information Technology | Computer Science | Download |
| An enhanced steady state genetic algorithm model for misuse network intrusion detection system | 2012 | Information Technology | Computer Science | Download |
| Communication impact on non-contiguous allocation strategies for 2- D mesh multicomputer system | 2012 | Information Technology | Computer Information Systems | Download |
| Design and implementation of portal system for schools in less-developed area : A field study in karak governorate | 2012 | Information Technology | Computer Science | Download |
| Developing a decision support system for seaport management case study : iraqi seaports | 2012 | Information Technology | Computer Information Systems | Download |
| Developing a virtual-machine-based distributed web crawling model | 2012 | Information Technology | Computer Information Systems | Download |
| evaluating semantic measures by computing the coverage of a condensed | 2016 | Information Technology | Computer Science | Download |
| voice eneryption twin stream cipher algorithm | 2016 | Information Technology | Computer Science | Download |
| enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process | 2012 | Information Technology | Computer Science | Download |
| Geographical information systems in analysis and enhancement for problems solving and decision making | 2012 | Information Technology | Computer Information Systems | Download |
| Improving scheduling on symmetric multiprocessing SMP architecture based on process behavior | 2012 | Information Technology | Computer Information Systems | Download |
| Modeling and analysis of cloud collaborative commerce | 2012 | Information Technology | Computer Information Systems | Download |
| XML database schema refinement through functional dependencies and normalization | 2012 | Information Technology | Computer Information Systems | Download |
| A framework model for arabic handwritten text recognittion to handle missing text fragments | 2013 | Information Technology | Computer Science | Download |
| A model for handwriting recognition using wavelet function and genetic algorithm | 2013 | Information Technology | Computer Information Systems | Download |
| A Critical Analysis of Kamila Shamsie's Burnt Shadows | 2015 | Information Technology | Computer Information Systems | Download |
| a semantic ontology based concept for measuring security compliance of cloud service providers | 2013 | Information Technology | Computer Information Systems | Download |
| An efficient associative classification algorithm for text categorization | 2012 | Information Technology | Computer Information Systems | Download |
| A New Technique to Protect the Ownership of Images in Social Network using Encryption and Steganography Algorithms | 2016 | Information Technology | Computer Information Systems | Download |
| An enhanced hopfield network model for misuse intrusion detection system | 2013 | Information Technology | Computer Science | Download |
| An enhanced technique for segmentation and encrypt data to storing in cloud computing | 2013 | Information Technology | Computer Information Systems | Download |
| automobile accident prediction and avoidance system using multilayer preceptron neural networks | 2013 | Information Technology | Computer Science | Download |
| design and implementation of knowledge-based system for text retrieval based on context and user's prior knowledge | 2013 | Information Technology | Computer Science | Download |
| Developing a computer - based information system to improve the diagnosis of blood anemia | 2013 | Information Technology | Computer Information Systems | Download |
| Developing a high-performance adjustable-quality data compressipn scheme for multimedia messaging | 2013 | Information Technology | Computer Science | Download |
| Enhanced k_way method in apriori algorithm for mining the association rules through embedding SQL commands | 2013 | Information Technology | Computer Information Systems | Download |
| Enhancement of a steganographic algorithm for hiding text messages in image | 2013 | Information Technology | Computer Science | Download |
| Enhancing open space method in data hiding technique - text under text | 2013 | Information Technology | Computer Information Systems | Download |
| Enhancing the compression ratio of the HCDC-based text compression scheme | 2013 | Information Technology | Computer Information Systems | Download |
| hybrid technique for arabic text compression | 2013 | Information Technology | Computer Science | Download |
| latent semantic analysis LSA and ontological concepts to support e-recruitment | 2013 | Information Technology | Computer Science | Download |
| Real time arabic translation system for signboard images based on printed character recognition | 2013 | Information Technology | Computer Science | Download |
| Using semantic ontology to evaluate tenders and bidders for e-government applications | 2013 | Information Technology | Computer Information Systems | Download |
| Deriving a new Markup Language from the Extensible Markup Language (XML) to enhance Electrical Engineering Applicaions | 2014 | Information Technology | Computer Information Systems | Download |
| a hybrid broadcasting technique based on massage priority in vanet | 2014 | Information Technology | Computer Science | Download |
| A Model of Environment Representation Architecture for Intelligent Robot | 2014 | Information Technology | Computer Science | Download |
| A new approach for real time Face recognition System using a modified Eigenfaces with Edge Tracking | 2014 | Information Technology | Computer Information Systems | Download |
| An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data | 2014 | Information Technology | Computer Science | Download |
| An Enhanced model For government applications in iraq | 2014 | Information Technology | Computer Information Systems | Download |
| An Enhancement of the Replacement Steady State Genetic Algorithm for Intrusion Detection | 2014 | Information Technology | Computer Information Systems | Download |
| Bandwidth Saving method based Sharing Data Downloaded From Cloud Between Smartphones In Wifi Network | 2014 | Information Technology | Computer Science | Download |
| Cloud Customer Relationship Management (CRM)Ontology | 2014 | Information Technology | Computer Information Systems | Download |
| Comparative analysis of Database Performance for Well-Known Cloud Computing Enviroments | 2014 | Information Technology | Computer Information Systems | Download |
| Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms | 2014 | Information Technology | Computer Information Systems | Download |
| Extracting instances to improve semantic matching in the domain of Renewable Energy | 2014 | Information Technology | Computer Information Systems | Download |
| Increasing The Lifetime of Wireless Sensor Networks using LEACH Protocol | 2014 | Information Technology | Computer Information Systems | Download |
| Intrusion Detectiopn System Based on Carpenter/Grossperg Artificial Neural Network | 2014 | Information Technology | Computer Science | Download |
| Resource Allocation Technique to Obtain Energy Efficient Cloud | 2014 | Information Technology | Computer Science | Download |
| Scaling Cloud resources under different Virtualization Hybervisors Types with Regards to Machine Utilization | 2014 | Information Technology | Computer Information Systems | Download |
| Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method | 2014 | Information Technology | Computer Science | Download |
| Text Image steganography Using LSD Method | 2014 | Information Technology | Computer Science | Download |
| new techniqure to embed encrypted or code in colored image by using first and third lsb | 2014 | Information Technology | Computer Information Systems | Download |
| Back Propagation Recursive Least Squares Algorithm for Intrusion Detection Systems | 2014 | Information Technology | Computer Science | Download |
| Multimedia Information Acquisition and Retrieval Enhancement using Intelligent Search System_. | 2015 | Information Technology | Computer Science | Download |
| Cost Break-Even Model for Cloud Computing | 2015 | Information Technology | Computer Information Systems | Download |
| Computer Aided Diagnosis of Breast Cancer Using Image Processing Techniques and Neural Networks with Logistic Regression | 2015 | Information Technology | Computer Science | Download |
| Kohonen SOM with conscience function neural network based energy efficient cluctering and routing wireless sensor networks | 2015 | Information Technology | Computer Science | Download |
| New Technique for Cross-Platform Availability Control over Electronic Messages | 2015 | Information Technology | Computer Information Systems | Download |
| Practical Measurements Framework for Software Integrity | 2015 | Information Technology | Computer Science | Download |
| Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network | 2015 | Information Technology | Computer Science | Download |
| Enhance the Security of Cloud Computing Environment Using Semantic Segregation Techniques | 2015 | Information Technology | Computer Science | Download |
| User Authentication System Using Emoji pictures passwords | 2015 | Information Technology | Computer Science | Download |
| Secure Communication Based on Encryption and LSB Steganography Voice | 2016 | Information Technology | Computer Science | Download |
| Document Classification Method Based on Contents Using an Improved Multinomial Naïve Bayes Model | 2015 | Information Technology | Computer Science | Download |
| A New Audio Steganography Method Using Bi-LSB Embedding and Secret Message Integrity Validation | 2015 | Information Technology | Computer Science | Download |
| A MULTI-MODEL KEYSTROKE DYNAMICS ANOMALY DETECTOR FOR USER AUTHENTICATION | 2016 | Information Technology | Computer Science | Download |
| Comparative Analysis for the Performance of Order Preserving Encryption Technique | 2016 | Information Technology | Computer Science | Download |
| A Content-Based Brain Tumor Images System for Classification, Retrieval and Diagnosis | 2016 | Information Technology | Computer Science | Download |
| Data Gathering Using Mobile Elements In Wireless Sensors Networks (WSNs) | 2016 | Information Technology | Computer Science | Download |
| Partial query processing over encrypted data with Object Relational Mapping. | 2016 | Information Technology | Computer Science | Download |
| Enhancing the Performance of the Hybrid Recovery Method by Defining Video Content Type | 2016 | Information Technology | Computer Information Systems | Download |
| Background Subtraction Using Coplanar Filter and Quadtree Decomposition for Objects Counting | 2016 | Information Technology | Computer Information Systems | Download |
| Comparative Study between (SVM) and (KNN) Classifiers after adding (PCA) to Improve of IntrusionDetection System | 2015 | Information Technology | Computer Information Systems | Download |
| Analytical Study for Measuring the Effects of Database Segregation Multi-tenancy Approaches on Cost and Performance in Cloud Computing | 2015 | Information Technology | Computer Information Systems | Download |
| Voice Encryption Using Twin Stream Cipher Algorithm | 2016 | Information Technology | Computer Science | Download |
| Performance Evaluation of Similarity Functions for Duplicate Record Detection | 2011 | Information Technology | Computer Information Systems | Download |
| Proposed Model For Software Configuration Management Theoretical Tool | 2011 | Information Technology | Computer Information Systems | Download |
| Performance Evaluation of Blocking Methods for Duplicate Record Detection | 2010 | Information Technology | Computer Information Systems | Download |
| Towards Achieving, Self-Load Balancing In Autonomic Overlay Networks | 2012 | Information Technology | Computer Science | Download |
| Precluding Software Piracy Using Asymmetric Cryptography | 2009 | Information Technology | Computer Information Systems | Download |
| CFD_Mine: Discovery of Conditional Functional Dependencies in Relational Databases. | 2009 | Information Technology | Computer Science | Download |
| A New Secure Architecture for Trust and Privacy on Social Network Sites | 2011 | Information Technology | Computer Science | Download |
| A Comparative Study of Indexing Techniques for Relational Database Management Systems | 2011 | Information Technology | Computer Information Systems | Download |
| The Effectiveness of Haar Features and Threshold in Multiple Face Detection Systems Based on Adaboost Algorithm | 2011 | Information Technology | Computer Science | Download |
| Mobile Trade Agent Security | 2011 | Information Technology | Computer Information Systems | Download |
| A Hybrid Approach for Web Change Detection | 2009 | Information Technology | Computer Information Systems | Download |
| GPS – MCRM INTEGRATION SOLUTION | 2009 | Information Technology | Computer Information Systems | Download |
| Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography | 2011 | Information Technology | Computer Science | Download |
| A Decision Support System for E-banking Adoption in Jordan: A Critical Success Factors Perspective | 2008 | Information Technology | Computer Information Systems | Download |
| A Secure Home Appliances Remote Control Model | 2014 | Information Technology | Computer Science | Download |
| Image Steganography Technique Based on Predetermined Pattern and Histogram Analysis | 2015 | Information Technology | Computer Science | Download |
| Hiding Secret Images within RGB Images Using an Enhanced LSB Method | 2014 | Information Technology | Computer Science | Download |
| A Model for Cognitive Map Construction Using Spatial Information Indoor Environment | 2014 | Information Technology | Computer Science | Download |
| Design of Anti Money Laundering Framework for Jordan | 2009 | Information Technology | Computer Information Systems | Download |
| Integrating Internet of Things and Wireless Sensor Networks for Metropolitan Explosive Detection | 2014 | Information Technology | Computer Science | Download |
| Enhanced Solutions for Misuse Network Intrusion Detection System using SGA and SSGA | 2015 | Information Technology | Computer Information Systems | Download |
| Framework Model of Integration xRM with GIS | 2011 | Information Technology | Computer Information Systems | Download |
| A Framework Model for Arabic Handwritten Text Recognition to Handle Missing Text Fragments | 2013 | Information Technology | Computer Science | Download |
| Evaluating Semantic Measures by Computing the Coverage of a Condensed Text | 2016 | Information Technology | Computer Science | Download |
| Enhanced Distributed Defense Mechanism Against Volumetric DDoS Attacks | 2017 | Information Technology | Computer Science | Download |
| Offline Arabic Handwritten Isolated Character Recognition System Using Support vector Machine and Neural Network | 2017 | Information Technology | Computer Science | Download |
| The Semantic Similarity Measures Using Arabic Ontology | 2017 | Information Technology | Computer Science | Download |
| Detecting Phishing Emails Using Machine Learning Techniques | 2017 | Information Technology | Computer Science | Download |
| Statistical Steganalysis Detector Model for 8-bit Depth Images | 2017 | Information Technology | Computer Science | Download |
| Measuring the Quality of Online Learning Material Using Semantic Similarity Measures | 2017 | Information Technology | Computer Science | Download |
| Statistical Arabic Grammar Analyzer Based on Rules Mining Approach Using Naïve Bayesian Algorithm | 2017 | Information Technology | Computer Science | Download |
| Modified Random Early Detection (RED) Technique Using Various Congestion Indicators | 2017 | Information Technology | Computer Information Systems | Download |
| Accuracy Evaluation of Brain Tumor Detection using Entropy-based Image Thresholding | 2017 | Information Technology | Computer Information Systems | Download |
| Adoption Conceptual Framework based on Agility and Flexibility in Cloud Computing System | 2017 | Information Technology | Computer Science | Download |
| Performance Analysis for Hashing Over Encrypted Data Techniques | 2017 | Information Technology | Computer Information Systems | Download |
| Finding Cliques In Simulated Social Networks Using Graph Coloring Technique | 2017 | Information Technology | Computer Science | Download |
| Building Ontology-based Metadata to Support Arabic Quality Assurance Documentation | 2017 | Information Technology | Computer Science | Download |
| Multiple Pseudo Random Number Generators Implementation for Watermarking Technique | 2017 | Information Technology | Computer Science | Download |
| A Signcryption Approach Based on Rabin Digital Signature Schemes | 2017 | Information Technology | Computer Science | Download |
| Computation Complexity Improvement for Digital Signature Algorithm | 2017 | Information Technology | Computer Science | Download |
| Security Enhancement of Image Steganography Using Embedded Integrity Features | 2017 | Information Technology | Computer Science | Download |
| The Detection of Data Hiding in RGB Images Using Statistical Steganalysis | 2017 | Information Technology | Computer Science | Download |
| An Improved Text Watermarking Algorithm for Color Images | 2017 | Information Technology | Computer Science | Download |
| An anomaly detection model for signature authentication on mobile devices | 2018 | Information Technology | Computer Science | Download |
| Image classification based on enhancement of local binary pattern | 2018 | Information Technology | Computer Science | Download |
| Implementation of proposed lightweight cryptosystem for use in Cloud Computing Security | 2018 | Information Technology | Computer Science | Download |
| Optimizing Indoor Tracking System for Wireless Sensor Networks Using ZigBee | 2018 | Information Technology | Computer Science | Download |
| Comparative study for Order Preserving Encryption Characteristic | 2018 | Information Technology | Computer Science | Download |
| Enhancement of Digital Signature Scheme | 2018 | Information Technology | Computer Science | Download |
| PIN Authentication Using Multi-Model Anomaly Detection in Keystroke Dynamics on Mobile Devices | 2019 | Information Technology | Computer Science | Download |
| Improving AES Algorithm using Multiple Secret Keys | 2019 | Information Technology | Computer Science | Download |
| Steganalysis of Color Images for Low Payload Detection | 2019 | Information Technology | Computer Science | Download |
| Imperceptibility and Robustness Improvement using segmented DWT Watermarking Technique | 2019 | Information Technology | Computer Science | Download |
| Article Reformatting Algorithm for Multiple Journal Template | 2019 | Information Technology | Computer Science | Download |
| ANN and DNN-based Models for DDoS Detection via Network Traffic Forecasting | 2019 | Information Technology | Computer Science | Download |
| Tuning Approach to Improve Multilayer Perceptron for Breast Cancer Prediction | 2019 | Information Technology | Computer Science | Download |
| Automated Arabic Essay Grading System based on Support Vector Machine and Text Similarity Algorithm | 2019 | Information Technology | Computer Science | Download |
| Strengthening the MD5 File Integrity Algorithm with User Fingerprint | 2019 | Information Technology | Computer Science | Download |
| Image Analysis for Mandible Bone Properties on Cone-Beam CT to Detect Osteoporosis | 2019 | Information Technology | Computer Science | Download |
| Efficient Graph-Based Image Segmentation for Natural Images | 2017 | Information Technology | Computer Science | Download |
| A COMPARATIVE STUDY OF TWO OBJECTIVE FUNCTIONS | 2020 | Information Technology | Computer Science | Download |
| User Authentication Based on Statistical Mouse Dynamics Biometrics | 2020 | Information Technology | Computer Science | Download |
| A Hadoop map reduce implementation of C5.0 decision | 2020 | Information Technology | Computer Science | Download |
| An Improved BIRCH Algorithm for Breast Cancer Clustering | 2020 | Information Technology | Computer Science | Download |
| Toward an Arabic Essay Grading Benchmark | 2020 | Information Technology | Computer Science | Download |
| How to Detect Phishing Website Using Three-Model Ensemble | 2020 | Information Technology | Computer Science | Download |
| Deep CPC Deep Learning Model for Colorectal Polyps Classification (1) | 2020 | Information Technology | Computer Science | Download |
| Enhanced Arabic Root-Based Lemmatizer | 2020 | Information Technology | Computer Science | Download |
| Homomorphic Encryption of Text Documents | 2020 | Information Technology | Cyber Security and Cloud Computing | Download |
| A New Symmetric Lightweight Encryption Algorithm Based on DNA for Internet of Things Devices | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
| A Novel Framework to Secure Schema for Data Warehouse in Cloud Computing (Force Encryption Schema Solution) | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
| Energy Efficient Localization Model in Mobile Computing | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
| Agile Encryption Scheme for Multimedia Files Using Random Data | 2021 | Information Technology | Computer Science | Download |
| An Empirical Study of Multi-instance RPL Protocol | 2021 | Information Technology | Computer Science | Download |
| Detecting Bug Severity Level using Machine Learning Techniques | 2021 | Information Technology | Computer Science | Download |
| Jordanian Companies’ Stock Price Prediction using Hybrid RNN with Long Term Short Memory and Tabu List Memory | 2021 | Information Technology | Computer Science | Download |
| Lightweight Cryptosystem for IoT Image Encryption Using DNA | 2021 | Information Technology | Computer Science | Download |
| Innovative Technique to Encrypt Data for Data Mining Purposes in Cloud Computing | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
| The Impact of Cloud Computing Involvement on Competitive Advantage | 2021 | Information Technology | Cyber Security and Cloud Computing | Download |
| The Impact of Cloud Computing Involvement on Competitive Advantage | 2022 | Information Technology | Cyber Security and Cloud Computing | Download |
