Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Wesam AlmobaideenProfessor of Cybersecurity, Rochester Institute of Technology Dubai and The University of JordanVerified email at rit.edu
Azzam SleitProfessor of Computer Science, The University of JordanVerified email at ju.edu.jo
Heba SaadehAssociate Professor in Bioinformatics and Epigenetics at The University of JordanVerified email at ju.edu.jo
Khair Eddin SabriProfessor, University of JordanVerified email at ju.edu.jo
Dr. Iman AlMomaniAssociate Professor, Senior IEEE Member, University of JordanVerified email at ju.edu.jo
Mohammad QatawnehProfessor of Computer Science, The University of Jordan - KASIT- Department of Computer ScienceVerified email at ju.edu.jo
Mamoon AllanUniversity of JordanVerified email at ju.edu.jo
Mousa Al-AkhrasAssociate Professor - The University of JordanVerified email at ju.edu.jo
Hazem HiaryProfessor of Image Processing, The University of JordanVerified email at ju.edu.jo
Dr. Huda SaadehAssistant Professor at Rochester Institute of Technology of DubaiVerified email at rit.edu
hamzeh aljawawdehZarqa UniversityVerified email at zu.edu.jo
Raja S AlomariAssistant Professor, The University of JordanVerified email at buffalo.edu
Noor Sami Al-AnbakiPhD in Computer ScienceVerified email at fgs.ju.edu.jo
Amjad HudaibProfessor of Software Engineering, The University of JordanVerified email at ju.edu.jo
Fawaz AL ZaghoulProfessor of Software EngineeringVerified email at ju.edu.jo
Mohammed Omar SalamehUKMVerified email at siswa.ukm.edu.my