Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Ola SurakhiAmerican University of MadabaEmail verificata su aum.edu.jo
- Mohammad QatawnehProfessor of Computer Science, The University of Jordan - KASIT- Department of Computer ScienceEmail verificata su ju.edu.jo
- Wesam AlmobaideenProfessor of Cybersecurity, Rochester Institute of Technology Dubai and The University of JordanEmail verificata su rit.edu
- Pak Lun FungUniversity of HelsinkiEmail verificata su helsinki.fi
- Tareq HusseinProfessor, the University of JordanEmail verificata su ju.edu.jo
- Martha Arbayani ZaidanAcademy Research Fellow | Data Scientist, University of HelsinkiEmail verificata su helsinki.fi
- Amjad HudaibProfessor of Software Engineering, The University of JordanEmail verificata su ju.edu.jo
- Rania Mahmoud GhoniemAssistant Professor, College of Computer and Information Sciences, Princess Nourah bint AbdulrahmanEmail verificata su pnu.edu.sa
- Naser Hossein MotlaghUniversity of HelsinkiEmail verificata su helsinki.fi
- Sami SerhanPof. of Computer ScienceEmail verificata su ju.edu.jo
- Dr Mohammad Aref AlshraidehA Professor of AI , The University of Jordan; Lusail University; malshraideh@lusail.edu.qaEmail verificata su ju.edu.jo
- Ahmad ShariehProfessor of Computer Science, The University of JordanEmail verificata su ju.edu.jo
- Azzam SleitProfessor of Computer Science, The University of JordanEmail verificata su ju.edu.jo
- hussein al ofeishatAL- BALQA APPLIED UNIVERSITYEmail verificata su bau.edu.jo