Get my own profile
Public access
View all1 article
0 articles
available
not available
Based on funding mandates
Co-authors
Yousef KilaniAssociate Prof. of Computer Information Systems, Hashemite University, JordanVerified email at hu.edu.jo
Abdel-Rahman Al-GhuwairiAssociate Professor at Software Engineering Department of Hashemite University - JordanVerified email at hu.edu.jo
Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
Awni Itradat, Ph.DDepartment of Computer Engineering, Hashemite UniversityVerified email at hu.edu.jo
Ahmed H. SawalmehSoftware Engineering, College of Engineering, Alfaisal University, SaudiVerified email at alfaisal.edu
Emad E. AbdallahProfessor of Information System Security, Hashemite UniversityVerified email at hu.edu.jo
Abdallah KhreishahNew Jersey Institute of TechnologyVerified email at njit.edu
Issa KhalilPrincipal Scientist - Qatar Computing Research Institute (QCRI)Verified email at hbku.edu.qa
Alaa Eddien AbdallahProfessor of Computer Science, Hashemite UniversityVerified email at hu.edu.jo
Maen HammadDepartment of Software Engineering, The Hashemite University, Zarqa, JordanVerified email at hu.edu.jo
Ibrahim al-oqilyProfessor of Computer Science, Al YAmamah UniversityVerified email at yu.edu.sa
Mohammad Nooman KhalafMSc Software EngineeringVerified email at ammanu.edu.jo
Khalid T. Al-SarayrehHashemite University, Department of Software EngineeringVerified email at hu.edu.jo
Mowafaq Salem AlzboonFaculty of Science and Information Technology Jadara University Irbid, JordanVerified email at jadara.edu.jo
Iain PhillipsLoughborough UniversityVerified email at phillips4.co.uk
Chris HindeProfessor of Computational Intelligence, Loughborough UniversityVerified email at lboro.ac.uk
Follow
Ayoub Alsarhan
Professor of Cyber Security, Hashemite University
Verified email at hu.edu.jo - Homepage