Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Arafat AwajanPrincess Sumaya University for Technology and Mutah UniversityVerified email at mutah.edu.jo
Mariam Mohammad BiltawiAssistant Professor of Artificial Intelligence and Data Science, Al-Hussein Technical UniversityVerified email at htu.edu.jo
Dr. Dima SuleimanTeacher of computer science, Jordan UniversityVerified email at ju.edu.jo
Ghazi Al-NaymatAjman UniversityVerified email at ajman.ac.ae
Malek Al-ZewairiJordan Information Security and Digital Forensics Research GroupVerified email at jisdf.org
Sara TedmoriAssociate Professor of Computer Science, Princess Sumaya University for TechnologyVerified email at psut.edu.jo
Sahar IdwanProfessor - The Hashemite UniversityVerified email at hu.edu.jo
Amjad HudaibProfessor of Software Engineering, The University of JordanVerified email at ju.edu.jo
Sufyan AlmajaliAssociate Professor of Computer Science, Princess Sumaya University for TechnologyVerified email at psut.edu.jo