Crea il mio profilo
Accesso pubblico
Visualizza tutto0 articoli
2 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Syed S RizviPennsylvania State UniversityEmail verificata su psu.edu
- Miad FaezipourPurdue UniversityEmail verificata su purdue.edu
- ABDUL RAZAQUEResearcherEmail verificata su my.bridgeport.edu
- Wafa ElmannaiUniversity of BridgeportEmail verificata su my.bridgeport.edu
- Ali ElrashidiProfessor, Electrical Engineering Department, University of business and TechnologyEmail verificata su ubt.edu.sa
- Laiali AlmazaydehProfessor of computer science and engineering, Al-Hussein Bin Talal UniversityEmail verificata su ahu.edu.jo
- Ramadhan J. MstafaDepartment of Computer Science, University of Zakho, Kurdistan Region, IraqEmail verificata su uoz.edu.krd
- Tarek SobhPresident and Professor of Electrical and Computer Engineering at Lawrence Technological UniversityEmail verificata su ltu.edu
- Ammar OdehPrincess Sumaya University for TechnologyEmail verificata su psut.edu.jo
- Marwah AlmasriSaudi Electronic UniversityEmail verificata su seu.edu.sa
- Jasem AlmotiriTaif UniversityEmail verificata su tu.edu.sa
- Ausif MahmoodProfessor, Computer Science and Engineering, University of BridgeportEmail verificata su bridgeport.edu
- Muneer AlshowkanOak Ridge National LaboratoryEmail verificata su ornl.gov
- Abdelshakour AbuzneidRoger Williams UniversityEmail verificata su rwu.edu
- Bandar AlotaibiAssociate Professor of Cybersecurity at University of TabukEmail verificata su ut.edu.sa
- Adwan AlanaziUniversity of BridgeportEmail verificata su my.bridgeport.edu
- Remah AlshininaPh.D. Computer Science and EngineeringEmail verificata su my.bridgeport.edu
- varun pandeUniversity Of BridgeportEmail verificata su bridgeport.edu
- Susrutha Babu SukhavasiUniversity of BridgeportEmail verificata su my.bridgeport.edu
- Abdulbast A. AbushgraAssistant Professor of CybersecurityEmail verificata su utica.edu