Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Jürgen SchönwälderConstructor UniversityVerified email at jacobs-university.de
Yousef HassounehBirzeit UniversityVerified email at birzeit.edu
Abdellatif Abu-IssaBirzeit UniversityVerified email at birzeit.edu
Abdalkarim AwadBirzeit UniversityVerified email at birzeit.edu
Wasel GhanemBirzeit UniversityVerified email at birzeit.edu
Khader MohammadBirzeit UniversityVerified email at birzeit.edu
Adnan M. ArarLecturer, College of Science and Technology, Hebron UniversityVerified email at hebron.edu
Dr. Ahmed MasriSenior Researcher/Simulation Specialist @ Nokia Standards- FinlandVerified email at nokia.com
Hedaia GhannamUniversity College LondonVerified email at ucl.ac.uk
Salama IkkiProfessor, Electrical Engineering, Lakehead University, CanadaVerified email at lakeheadu.ca
Sahel AlounehProfessor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)Verified email at aau.ac.ae
Mohamed HamdiUniversity of CarthageVerified email at supcom.rnu.tn
David HausheerProfessor of Networks and Distributed Systems Lab, Faculty of Computer Science, OVGU MagdeburgVerified email at osola.com
Thomas BocekUniversity of ZurichVerified email at ifi.uzh.ch
Olivier FestorUniversité de LorraineVerified email at inria.fr
Paul PurdomIndiana UniversityVerified email at cs.indiana.edu
Follow
Iyad Tumar
Associate Professor at Electrical and Computer Engineering Dept., Birzeit University
Verified email at birzeit.edu - Homepage