Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Yousef KilaniProf. of Computer Information Systems, Hashemite University, JordanVerified email at hu.edu.jo
- Abdel-Rahman Al-GhuwairiAssociate Professor at Software Engineering Department of Hashemite University - JordanVerified email at hu.edu.jo
- Albert Y. ZomayaPeter Nicol Russell Chair Professor of Computer Science, Sydney UniversityVerified email at sydney.edu.au
- Geyong MinUniversity of ExeterVerified email at exeter.ac.uk
- Awni Itradat, Ph.DDepartment of Computer Engineering, Hashemite UniversityVerified email at hu.edu.jo
- Ahmed H. SawalmehAlfaisal UniversityVerified email at alfaisal.edu
- Emad E. AbdallahProfessor of Information System Security, Hashemite UniversityVerified email at hu.edu.jo
- Abdallah KhreishahNew Jersey Institute of TechnologyVerified email at njit.edu
- Issa KhalilPrincipal Scientist - Qatar Computing Research Institute (QCRI)Verified email at hbku.edu.qa
- Alaa Eddien AbdallahProfessor of Computer Science, Hashemite UniversityVerified email at hu.edu.jo
- Maen HammadDepartment of Software Engineering, The Hashemite University, Zarqa, JordanVerified email at hu.edu.jo
- Ibrahim al-oqilyProfessor of Computer Science, The Hashemite UniversityVerified email at hu.edu.jo
- Mohammad Nooman KhalafMSc Software EngineeringVerified email at ammanu.edu.jo
- Khalid T. Al-SarayrehHashemite University, Department of Software EngineeringVerified email at hu.edu.jo
- Mowafaq Salem AlzboonFaculty of Information Technology Jadara University Irbid, JordanVerified email at jadara.edu.jo
- Iain PhillipsLoughborough UniversityVerified email at phillips4.co.uk
- Chris HindeProfessor of Computational Intelligence, Loughborough UniversityVerified email at lboro.ac.uk
Follow
Ayoub Alsarhan
Professor of Cyber Security, Hashemite University
Verified email at hu.edu.jo - Homepage