Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Mohammad H. AlshayejiAssociate Professor, Kuwait UniversityVerified email at ku.edu.kw
Bassam Jamil Mohd, Ph. D.Hashemite UniversityVerified email at hu.edu.jo
Sahel AlounehProfessor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)Verified email at aau.ac.ae
Otmane AIT MOHAMEDProfessor of Computer Engineering, Concordia UniversityVerified email at concordia.ca
Ghiath SAMMANEVerified email at labofine.com
imtiaz ahmadKuwait UniversityVerified email at ku.edu.kw
Thaier Hayajneh, Ph. D., SMIEEEFordham Center for Cybersecurity, Fordham University, New York, USAVerified email at fordham.edu
Suood Al RoomiGeorgia Institute of Technology, Kuwait UniversityVerified email at gatech.edu
Osman HasanProfessor of Electrical Engineering, National University of Sciences and TechnologyVerified email at seecs.edu.pk
Dr. Hanem EllethyPhD, The Universityof QueenslandVerified email at uq.edu.au
Adnan RashidPostdoctoral Fellow, Hardware Verification Group, Concordia UniversityVerified email at concordia.ca
Amjad GawanmehUniversity of DubaiVerified email at ud.ac.ae
Sari Sultan, PhDUniversity of TorontoVerified email at mail.utoronto.ca
wathiq mansoorUniversity of DubaiVerified email at ud.ac.ae
Zaid Al-bayatiMcGill UniversityVerified email at mail.mcgill.ca
Mounir BoukadoumUQAMVerified email at uqam.ca
Khaza Anuarul HoqueAssistant Professor, Electrical Engineering and Computer Science (EECS), University of MissouriVerified email at missouri.edu
Ahmad Al-KhasawnehProfessor of Information Systems Science, Hashemite UniversityVerified email at hu.edu.jo
Mazen KharbutliMeta (Facebook)Verified email at meta.com
Raed MeslehProfessor of Electrical Engineering, German Jordanian UniversityVerified email at gju.edu.jo