Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Syed S RizviPennsylvania State UniversityVerified email at psu.edu
Miad FaezipourPurdue UniversityVerified email at purdue.edu
ABDUL RAZAQUEResearcherVerified email at my.bridgeport.edu
Wafa ElmannaiUniversity of BridgeportVerified email at my.bridgeport.edu
Laiali AlmazaydehProfessor of computer science and engineering, Al-Hussein Bin Talal UniversityVerified email at ahu.edu.jo
Ali ElrashidiProfessor, Electrical Engineering Department, University of business and TechnologyVerified email at ubt.edu.sa
Ramadhan J. MstafaDepartment of Computer Science, University of Zakho, Kurdistan Region, IraqVerified email at uoz.edu.krd
Tarek SobhPresident and Professor of Electrical and Computer Engineering at Lawrence Technological UniversityVerified email at ltu.edu
Ammar OdehPrincess Sumaya University for TechnologyVerified email at psut.edu.jo
Marwah AlmasriSaudi Electronic UniversityVerified email at seu.edu.sa
Ausif MahmoodProfessor, Computer Science and Engineering, University of BridgeportVerified email at bridgeport.edu
Muneer AlshowkanOak Ridge National LaboratoryVerified email at ornl.gov
Bandar AlotaibiAssociate Professor of Cybersecurity at University of TabukVerified email at ut.edu.sa
Abdelshakour AbuzneidRoger Williams UniversityVerified email at rwu.edu
Remah AlshininaPh.D. Computer Science and EngineeringVerified email at my.bridgeport.edu
varun pandeUniversity Of BridgeportVerified email at bridgeport.edu
Jasem AlmotiriTaif UniversityVerified email at tu.edu.sa
Abdulbast A. AbushgraAssistant Professor of CybersecurityVerified email at utica.edu
Adwan AlanaziUniversity of BridgeportVerified email at my.bridgeport.edu
Susrutha Babu SukhavasiUniversity of BridgeportVerified email at my.bridgeport.edu