Get my own profile
Public access
View all0 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Syed S RizviPennsylvania State UniversityVerified email at psu.edu
Miad FaezipourPurdue UniversityVerified email at purdue.edu
ABDUL RAZAQUEReseacherVerified email at my.bridgeport.edu
Wafa ElmannaiUniversity of BridgeportVerified email at my.bridgeport.edu
Ali ElrashidiProfessor, Electrical Engineering Department, University of business and TechnologyVerified email at ubt.edu.sa
Laiali AlmazaydehProfessor of computer science and engineering, Al-Hussein Bin Talal UniversityVerified email at ahu.edu.jo
Ramadhan J. MstafaDepartment of Computer Science, University of Zakho, Kurdistan Region, IraqVerified email at uoz.edu.krd
Tarek SobhPresident and Professor of Electrical and Computer Engineering at Lawrence Technological UniversityVerified email at ltu.edu
Ammar OdehPrincess Sumaya University for TechnologyVerified email at psut.edu.jo
Marwah AlmasriSaudi Electronic UniversityVerified email at seu.edu.sa
Jasem AlmotiriTaif UniversityVerified email at tu.edu.sa
Ausif MahmoodProfessor, Computer Science and Engineering, University of BridgeportVerified email at bridgeport.edu
Muneer AlshowkanOak Ridge National LaboratoryVerified email at ornl.gov
Adwan AlanaziUniversity of BridgeportVerified email at my.bridgeport.edu
Bandar AlotaibiAssociate Professor of Cybersecurity at University of TabukVerified email at ut.edu.sa
varun pandeUniversity Of BridgeportVerified email at bridgeport.edu
Remah AlshininaPh.D. Computer Science and EngineeringVerified email at my.bridgeport.edu
Abdulbast A. AbushgraAssistant Professor of CybersecurityVerified email at utica.edu
Susrutha Babu SukhavasiUniversity of BridgeportVerified email at my.bridgeport.edu
Suparshya Babu SukhavasiUniversity of BridgeportVerified email at my.bridgeport.edu