Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Wesam AlmobaideenProfessor of Cybersecurity, Rochester Institute of Technology Dubai and The University of JordanVerified email at rit.edu
- Azzam SleitProfessor of Computer Science, The University of JordanVerified email at ju.edu.jo
- Heba SaadehAssociate Professor in Bioinformatics and Epigenetics at The University of JordanVerified email at ju.edu.jo
- Khair Eddin SabriProfessor, University of JordanVerified email at ju.edu.jo
- Prof. Iman AlMomaniFull Professor, Senior IEEE Member, Top 2% Scientists (Sandford), University of JordanVerified email at ju.edu.jo
- Mohammad QatawnehProfessor of Computer Science, The University of Jordan - KASIT- Department of Computer ScienceVerified email at ju.edu.jo
- Mamoon AllanUniversity of JordanVerified email at ju.edu.jo
- Mousa Al-AkhrasAssociate Professor - The University of JordanVerified email at ju.edu.jo
- Hazem HiaryProfessor of Image Processing, The University of JordanVerified email at ju.edu.jo
- Dr. Huda SaadehAssistant Professor at Rochester Institute of Technology of DubaiVerified email at rit.edu
- hamzeh aljawawdehZarqa UniversityVerified email at zu.edu.jo
- Raja S AlomariAssistant Professor, The University of JordanVerified email at buffalo.edu
- Noor Sami Al-AnbakiPhD in Computer ScienceVerified email at fgs.ju.edu.jo
- Amjad HudaibProfessor of Software Engineering, The University of JordanVerified email at ju.edu.jo
- Fawaz AL ZaghoulProfessor of Software EngineeringVerified email at ju.edu.jo
- Mohammed Omar SalamehUKMVerified email at siswa.ukm.edu.my