Get my own profile
Public access
View all3 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Yaser JararwehComputer Science Department, Jordan University of Science and TechnologyVerified email at just.edu.jo
Mahmoud Al-AyyoubAjman UniversityVerified email at ajman.ac.aeProf. Elhadj BenkhelifaProfessor of Computer Science and Artificial Intelligence, Staffordshire University, UK.Verified email at staffs.ac.uk
Maad Ebrahim, PhDPostdoctoral Fellow at the University of British ColumbiaVerified email at ubc.ca
Ahmad Al DoulatAssistant Professor at East Tennessee State UniversityVerified email at etsu.edu
Mohammed A. ShehabDoctor of Philosophy in Electrical and Computer Engineering, Concordia UniversityVerified email at daad-alumni.de
Ala DarabsehResearch Engineer, NYUADVerified email at nyu.edu
Mohammed I. Al-SalehAssistant Professor at Higher Colleges of Technology, UAEVerified email at just.edu.jo
Khaled Z. AlawnehJordan University of Science and TechnologyVerified email at just.edu.jo
Musab Al-HadrusiPhD Candidate, Wayne State UniversityVerified email at wayne.edu
Mustafa DaraghmehAssistant Professor of Computer Science, Wilfrid Laurier UniversityVerified email at wlu.ca
Osamah S. BadarnehProfessor, Princess Sumaya University for TechnologyVerified email at psut.edu.jo
Siyakha N MthunziResearcher in Cloud Computing Applications Security. Faculty of Computing, Engineering and SciencesVerified email at research.staffs.ac.uk
Abdallah KhreishahNew Jersey Institute of TechnologyVerified email at njit.edu