Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Moatsum AlawidaAssistant Prof of Cybersecurity, Abu Dhabi University.Verified email at adu.ac.ae
Sufian KhwaldehAssociate Professor in Business Information Technology Department, The University of JordanVerified email at ju.edu.jo
Issam AlHadidThe University of JordanVerified email at ju.edu.jo
Ra'ed Masa'dehThe University of Jordan - Professor of Management Information SystemsVerified email at ju.edu.jo
Je Sen TehUniversiti Sains MalaysiaVerified email at usm.my
Ammar Khader Mohammad AlmasriPh.D Management Information System, Al-Balqa Applied UniversityVerified email at bau.edu.jo
Joemon JoseProfessor of Computer Science, University of GlasgowVerified email at glasgow.ac.uk
Saed KhawaldehUniversity of OxfordVerified email at ndcn.ox.ac.uk
Erbuğ ÇelebiCyprus International UniversityVerified email at ciu.edu.tr
Usama PervaizPhD in Clinical NeuroscienceVerified email at ndcn.ox.ac.uk
Dr Oludare Isaac AbiodunUniversity of Abuja. Universiti Sains Malaysia, Georgetown, MalaysiaVerified email at uniabuja.edu.ng
Fajie YuanWestlake UniversityVerified email at westlake.edu.cn
Hai-Tao YuUniversity of TsukubaVerified email at slis.tsukuba.ac.jp
Leif AzzopardiUniversity of StrathclydeVerified email at strath.ac.uk
Dr. Abiodun Esther Oludare Omolara...University of Abuja, Universiti Sains MalaysiaVerified email at uniabuja.edu.ng
Nazeeh GhatashehAssociate Professor, Dept. of Information Technology, The University of JordanVerified email at ju.edu.jo
Deepak PQueen's University Belfast, UK & IIT Madras, IndiaVerified email at acm.org
Follow
Rami S. Alkhawaldeh
Associate Professor in Computer Science, the University of Jordan
Verified email at ju.edu.jo