Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- Alaa Eddien AbdallahProfessor of Computer Science, Hashemite UniversityVerified email at hu.edu.jo
- Ahmed Fawzi OtoomProfessor, The Hashemite UniversityVerified email at hu.edu.jo
- Mohammad BsoulProfessor of Computer Science, The Hashemite UniversityVerified email at hu.edu.jo
- A. Ben HamzaProfessor, Information Systems Engineering, Concordia UniversityVerified email at ciise.concordia.ca
- Yousef KilaniProf. of Computer Information Systems, Hashemite University, JordanVerified email at hu.edu.jo
- Maen HammadDepartment of Software Engineering, The Hashemite University, Zarqa, JordanVerified email at hu.edu.jo
- Ahmad Al-KhasawnehProfessor of Information Systems Science, Hashemite UniversityVerified email at hu.edu.jo
- Nedal tahatProfessor of mathematics , The Hashemite UniversityVerified email at hu.edu.jo
- Essam Al daoudProfessor of Computer Science, Zarqa UniversityVerified email at zu.edu.jo
- Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityVerified email at hu.edu.jo
- Ibrahim al-oqilyProfessor of Computer Science, The Hashemite UniversityVerified email at hu.edu.jo
- Izzat Alsmadi: IEEE Senior memberTexas A&M San AntonioVerified email at tamusa.edu
- Sahar IdwanProfessor - The Hashemite UniversityVerified email at hu.edu.jo
Follow
Emad E. Abdallah
Professor of Information System Security, Hashemite University
Verified email at hu.edu.jo - Homepage