Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Ola SurakhiAmerican University of MadabaVerified email at aum.edu.jo
- Mohammad QatawnehProfessor of Computer Science, The University of Jordan - KASIT- Department of Computer ScienceVerified email at ju.edu.jo
- Wesam AlmobaideenProfessor of Cybersecurity, Rochester Institute of Technology Dubai and The University of JordanVerified email at rit.edu
- Pak Lun FungUniversity of HelsinkiVerified email at helsinki.fi
- Tareq HusseinProfessor, the University of JordanVerified email at ju.edu.jo
- Martha Arbayani ZaidanAcademy Research Fellow | Data Scientist, University of HelsinkiVerified email at helsinki.fi
- Amjad HudaibProfessor of Software Engineering, The University of JordanVerified email at ju.edu.jo
- Rania Mahmoud GhoniemAssistant Professor, College of Computer and Information Sciences, Princess Nourah bint AbdulrahmanVerified email at pnu.edu.sa
- Naser Hossein MotlaghUniversity of HelsinkiVerified email at helsinki.fi
- Sami SerhanPof. of Computer ScienceVerified email at ju.edu.jo
- Dr Mohammad Aref AlshraidehA Professor of AI , The University of Jordan; Lusail University; malshraideh@lusail.edu.qaVerified email at ju.edu.jo
- Nidal M. ErshaidatProfessor of High Energy Physics, The University of JordanVerified email at ju.edu.jo
- Darren WraithAssociate Professor, Queensland University of TechnologyVerified email at qut.edu.au
- Ahmad ShariehProfessor of Computer Science, The University of JordanVerified email at ju.edu.jo
- Azzam SleitProfessor of Computer Science, The University of JordanVerified email at ju.edu.jo
- hussein al ofeishatAL- BALQA APPLIED UNIVERSITYVerified email at bau.edu.jo
- Walid SalamehPrincess Sumaya University for TechnologyVerified email at psut.edu.jo
- Antonio MoraAssociate Professor at Dept. of Signal Theory, Telematics and Communications. University of GranadaVerified email at ugr.es