Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
- Ola SurakhiAmerican University of MadabaVerified email at aum.edu.jo
- Mohammad QatawnehProfessor of Computer Science, The University of Jordan - KASIT- Department of Computer ScienceVerified email at ju.edu.jo
- Wesam AlmobaideenProfessor of Cybersecurity, Rochester Institute of Technology Dubai and The University of JordanVerified email at rit.edu
- Pak Lun FungUniversity of HelsinkiVerified email at helsinki.fi
- Tareq HusseinProfessor, the University of JordanVerified email at ju.edu.jo
- Martha Arbayani ZaidanAcademy Research Fellow | Data Scientist, University of HelsinkiVerified email at helsinki.fi
- Amjad HudaibProfessor of Software Engineering, The University of JordanVerified email at ju.edu.jo
- Mohammed JamoosComputer Science Department, Al-Quds UniversityVerified email at staff.alquds.edu
- Rania Mahmoud GhoniemAssistant Professor, College of Computer and Information Sciences, Princess Nourah bint AbdulrahmanVerified email at pnu.edu.sa
- Naser Hossein MotlaghUniversity of HelsinkiVerified email at helsinki.fi
- Sami SerhanPof. of Computer ScienceVerified email at ju.edu.jo
- DR Mohammad Aref AlshraidehA Professor of AI , The University of Jordan; Lusail University; malshraideh@lusail.edu.qaVerified email at ju.edu.jo
- Ahmad ShariehProfessor of Computer Science, The University of JordanVerified email at ju.edu.jo
- Azzam SleitProfessor of Computer Science, The University of JordanVerified email at ju.edu.jo
- hussein al ofeishatAL- BALQA APPLIED UNIVERSITYVerified email at bau.edu.jo