Crea il mio profilo
Accesso pubblico
Visualizza tutto8 articoli
5 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yu ZhuangTexas Tech UniversityEmail verificata su ttu.edu
- Mohammed Saeed AlkatheiriUniversity of JeddahEmail verificata su uj.edu.sa
- Ahmad O. Aseeri, Ph.D.College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Saudi ArabiaEmail verificata su psau.edu.sa
- Bipana ThapaliyaTexas Tech UniversityEmail verificata su ttu.edu
- Nils WisiolAMDEmail verificata su nils-wisiol.de
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsEmail verificata su tu-berlin.de
- Meznah A. AlamroAssistant Professor, College of Computer & Information Sciences, Princess Nourah UniversityEmail verificata su pnu.edu.sa
- Gaoxiang LiTexas Tech UniversityEmail verificata su ttu.edu
- Faisal S. AlsubaeiAssistant Professor at University of JeddahEmail verificata su uj.edu.sa
- Muhammad KamranCollege of Computer Science and Engineering, University of Jeddah, KSA.Email verificata su uj.edu.sa
- Wafa almukadiProfessor Assistance of Software Engineering, University of JeddahEmail verificata su uj.edu.sa
- Mohammad AlahmadiFlorida State UniversityEmail verificata su uj.edu.sa
- Zohreh SafariAssistant Professor at Computer Science Department, ECSUEmail verificata su ttu.edu
Segui
Khalid T. Mursi
Assistant Professor, College of Computer Science and Engineering, University of Jeddah, Saudi Arabia
Email verificata su uj.edu.sa