Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Arafat AwajanProf. of Computer Science - Princess Sumaya University for Technology and Mutah UniversityVerified email at mutah.edu.jo
Mariam Mohammad BiltawiAssistant Professor of Artificial Intelligence and Data Science, Al-Hussein Technical UniversityVerified email at htu.edu.jo
Dr. Dima SuleimanAssistant professor, The University of JordanVerified email at ju.edu.jo
Ghazi Al-NaymatProfessor of Data Science, Ajman University, UAEVerified email at ajman.ac.ae
Malek Al-ZewairiJordan Information Security and Digital Forensics Research GroupVerified email at jisdf.org
Sahar IdwanProfessor - The Hashemite UniversityVerified email at hu.edu.jo
Sara TedmoriAssociate Professor of Computer Science, Princess Sumaya University for TechnologyVerified email at psut.edu.jo
Amjad HudaibProfessor of Software Engineering, The University of JordanVerified email at ju.edu.jo
Sufyan AlmajaliAssociate Professor of Computer Science, Princess Sumaya University for TechnologyVerified email at psut.edu.jo