Get my own profile
Public access
View all5 articles
4 articles
available
not available
Based on funding mandates
Co-authors
Chadi AssiIEEE Fellow, Professor, Concordia UniversityVerified email at ciise.concordia.ca
Ribal AtallahConcordia UniversityVerified email at encs.concordia.ca
Mourad DebbabiDean, Professor, Hydro-Québec Hitachi Research Chair, Concordia UniversityVerified email at concordia.ca
Khaled Sarieddine, Ph.D.Researcher, Concordia UniversityVerified email at mail.concordia.ca
Sadegh TorabiCyber Security Researcher, Center for Secure Information Systems (CSIS), George Mason UniversityVerified email at gmu.edu
Mohsen GhafouriAssociate Professor, Concordia UniversityVerified email at concordia.ca
Harag MargossianLebanese American UniversityVerified email at lau.edu.lb
Zahi NakadLebanese American UniversityVerified email at lau.edu.lb
Wissam FawazProfessor of Computer EngineeringVerified email at lau.edu.lb
Danial JafarigivResearcher, Hydro-Quebec Research InstituteVerified email at polymtl.ca
Maurice Khabbaz, Ph.D.American University of BeirutVerified email at aub.edu.lb
Mohamed ElhattabPhD, Concordia University, CanadaVerified email at encs.concordia.ca
Elias Bou-HarbLouisiana State UniversityVerified email at lsu.edu
Joseph KhouryLouisiana State UniversityVerified email at lsu.edu
Morteza Safaei PourSan Diego State UniversityVerified email at sdsu.edu
Mohamed Amine ArfaouiReseracher, Interdigital Inc.Verified email at interdigital.com