Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Abdallah KhreishahNew Jersey Institute of TechnologyVerified email at njit.edu
- Ala Al-FuqahaHamad Bin Khalifa University (CSE-ICT) and Western Michigan UniversityVerified email at wmich.edu
- Issa KhalilPrincipal Scientist - Qatar Computing Research Institute (QCRI)Verified email at hbku.edu.qa
- Zuochao (Edward) DouChief Software Architect & Privacy Computing ResearcherVerified email at njit.edu
- Mohsen Guizani, FIEEEMohamed Bin Zayed University of Artificial Intelligence (MBZUAI)Verified email at mbzuai.ac.ae
- Muhammad AnanAlfaisal UniversityVerified email at alfaisal.edu
- Muhannad AlmutiryAssociate Professor, Electrical Engineering Department, Northern Border universityVerified email at nbu.edu.sa
- Adel AldalbahiAssociate Professor, King Faisal UniversityVerified email at kfu.edu.sa
- Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityVerified email at hu.edu.jo
- Nasir SaeedAssociate Professor, United Arab Emirates University (UAEU), UAEVerified email at uaeu.ac.ae
- Sameer BatainehProfessor of Computer Engineering, Jordan University of Science and TechnologyVerified email at just.edu.jo
- Guanxiong LiuNew Jersey Institute of TechnologyVerified email at njit.edu
- Izzat Alsmadi: IEEE Senior memberTexas A&M San AntonioVerified email at tamusa.edu
- SalehSaleh Abdel-hafeezVerified email at just.edu.jo