Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- AHMAD SALAHUTAS; Zagazig Univeristy; Hunan University [Associate Professor]Verified email at hnu.edu.cn
- Mahmoud BekhitLecturer at Australian Catholic UniversityVerified email at acu.edu.au
- Walaa H. El-AshmawiFaculty of Computers and Informatics, Suez Canal UniversityVerified email at ci.suez.edu.eg
- Tarek GaberSenior Lecturer in Cybersecurity, University of Salford, UK & Professor, Suez Canal University, EGVerified email at salford.ac.uk
- Ayman NabilAssistant Professor of Computer Science, Misr international UniversityVerified email at miuegypt.edu.eg
- Mariem AyediCollege of Computer Science and Engineering Alkharj _PSAUVerified email at psau.edu.sa
- Ahmed AliCollege of Engineering and Computer Science, Prince Sattam Bin Abdulaziz UniversityVerified email at psau.edu.sa
- Dr. Eng. Ahmed S. SalamaResearcher, Assistant ProfessorVerified email at chi.edu.eg
- Ahmed Fathalla (ORCID: 0000-0001-5...Department of Mathematics, Faculty of Science,Suez Canal University, Ismailia, Egypt.Verified email at science.suez.edu.eg
Follow
Esraa Eldesouky
College of Engineering and Computer Science, Prince Sattam Bin Abdulaziz University
Verified email at psau.edu.sa