Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Arafat AwajanPrincess Sumaya University for Technology and Mutah UniversityVerified email at mutah.edu.jo
- Mariam Mohammad BiltawiAssistant Professor of Artificial Intelligence and Data Science, Al-Hussein Technical UniversityVerified email at htu.edu.jo
- Dr. Dima SuleimanAssistant professor, The University of JordanVerified email at ju.edu.jo
- Ghazi Al-NaymatProfessor of Data Science, Ajman University, UAEVerified email at ajman.ac.ae
- Malek Al-ZewairiJordan Information Security and Digital Forensics Research GroupVerified email at jisdf.org
- Sara TedmoriAssociate Professor of Computer Science, Princess Sumaya University for TechnologyVerified email at psut.edu.jo
- Sahar IdwanProfessor - The Hashemite UniversityVerified email at hu.edu.jo
- Amjad HudaibProfessor of Software Engineering, The University of JordanVerified email at ju.edu.jo
- Sufyan AlmajaliAssociate Professor of Computer Science, Princess Sumaya University for TechnologyVerified email at psut.edu.jo