Crea il mio profilo
Accesso pubblico
Visualizza tutto4 articoli
1 articolo
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Abdallah KhreishahNew Jersey Institute of TechnologyEmail verificata su njit.edu
- Ala Al-FuqahaHamad Bin Khalifa University (CSE-ICT) and Western Michigan UniversityEmail verificata su wmich.edu
- Issa KhalilResearch Director - Qatar Computing Research Institute (QCRI)Email verificata su hbku.edu.qa
- Zuochao (Edward) DouChief Software Architect & Privacy Computing ResearcherEmail verificata su njit.edu
- Muhammad AnanAlfaisal UniversityEmail verificata su alfaisal.edu
- Adel AldalbahiAssociate Professor, King Faisal UniversityEmail verificata su kfu.edu.sa
- Muhannad AlmutiryAssociate Professor, Electrical Engineering Department, Northern Border universityEmail verificata su nbu.edu.sa
- Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityEmail verificata su hu.edu.jo
- Nasir SaeedAssociate Professor, United Arab Emirates University (UAEU), UAEEmail verificata su uaeu.ac.ae
- Izzat Alsmadi: IEEE Senior memberTexas A&M San Antonio; University of JordanEmail verificata su tamusa.edu
- Sameer BatainehProfessor of Computer Engineering, Jordan University of Science and TechnologyEmail verificata su just.edu.jo
- Guanxiong LiuNew Jersey Institute of TechnologyEmail verificata su njit.edu
- Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Email verificata su mbzuai.ac.ae
- SalehSaleh Abdel-hafeezEmail verificata su just.edu.jo