Crea il mio profilo
Accesso pubblico
Visualizza tutto1 articolo
0 articoli
Disponibili
Non disponibili
In base ai mandati di finanziamento
Coautori
- Yousef KilaniProf. of Computer Information Systems, Hashemite University, JordanEmail verificata su hu.edu.jo
- Abdel-Rahman Al-GhuwairiAssociate Professor at Software Engineering Department of Hashemite University - JordanEmail verificata su hu.edu.jo
- Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityEmail verificata su sydney.edu.au
- Geyong MinUniversity of ExeterEmail verificata su exeter.ac.uk
- Awni Itradat, Ph.DDepartment of Computer Engineering, Hashemite UniversityEmail verificata su hu.edu.jo
- Ahmed H. SawalmehAlfaisal UniversityEmail verificata su alfaisal.edu
- Emad E. AbdallahProfessor of Information System Security, Hashemite UniversityEmail verificata su hu.edu.jo
- Abdallah KhreishahNew Jersey Institute of TechnologyEmail verificata su njit.edu
- Issa KhalilPrincipal Scientist - Qatar Computing Research Institute (QCRI)Email verificata su hbku.edu.qa
- Alaa Eddien AbdallahProfessor of Computer Science, Hashemite UniversityEmail verificata su hu.edu.jo
- Maen HammadDepartment of Software Engineering, The Hashemite University, Zarqa, JordanEmail verificata su hu.edu.jo
- Ibrahim al-oqilyProfessor of Computer Science, The Hashemite UniversityEmail verificata su hu.edu.jo
- Mohammad Nooman KhalafMSc Software EngineeringEmail verificata su ammanu.edu.jo
- Khalid T. Al-SarayrehHashemite University, Department of Software EngineeringEmail verificata su hu.edu.jo
- Mowafaq Salem AlzboonFaculty of Science and Information Technology Jadara University Irbid, JordanEmail verificata su jadara.edu.jo
- Iain PhillipsLoughborough UniversityEmail verificata su phillips4.co.uk
- Chris HindeProfessor of Computational Intelligence, Loughborough UniversityEmail verificata su lboro.ac.uk
Segui
Ayoub Alsarhan
Professor of Cyber Security, Hashemite University
Email verificata su hu.edu.jo - Home page