Crea il mio profilo
Accesso pubblico
Visualizza tutto2 articoli
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Alaa Eddien AbdallahProfessor of Computer Science, Hashemite UniversityEmail verificata su hu.edu.jo
- Ahmed Fawzi OtoomProfessor, The Hashemite UniversityEmail verificata su hu.edu.jo
- Mohammad BsoulProfessor of Computer Science, The Hashemite UniversityEmail verificata su hu.edu.jo
- A. Ben HamzaProfessor, Information Systems Engineering, Concordia UniversityEmail verificata su ciise.concordia.ca
- Yousef KilaniProf. of Computer Information Systems, Hashemite University, JordanEmail verificata su hu.edu.jo
- Maen HammadDepartment of Software Engineering, The Hashemite University, Zarqa, JordanEmail verificata su hu.edu.jo
- Ahmad Al-KhasawnehProfessor of Information Systems Science, Hashemite UniversityEmail verificata su hu.edu.jo
- Nedal tahatProfessor of mathematics , The Hashemite UniversityEmail verificata su hu.edu.jo
- Essam Al daoudProfessor of Computer Science, Zarqa UniversityEmail verificata su zu.edu.jo
- Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityEmail verificata su hu.edu.jo
- Ibrahim al-oqilyProfessor of Computer Science, The Hashemite UniversityEmail verificata su hu.edu.jo
- Izzat Alsmadi: IEEE Senior memberTexas A&M San AntonioEmail verificata su tamusa.edu
- Sahar IdwanProfessor - The Hashemite UniversityEmail verificata su hu.edu.jo
Segui
Emad E. Abdallah
Professor of Information System Security, Hashemite University
Email verificata su hu.edu.jo - Home page