Get my own profile
Public access
View all4 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Jürgen SchönwälderConstructor UniversityVerified email at constructor.university
- Yousef HassounehBirzeit UniversityVerified email at birzeit.edu
- Abdellatif Abu-IssaBirzeit UniversityVerified email at birzeit.edu
- Abdalkarim AwadBirzeit UniversityVerified email at birzeit.edu
- Wasel GhanemBirzeit UniversityVerified email at birzeit.edu
- Khader MohammadBirzeit UniversityVerified email at birzeit.edu
- Adnan M. ArarLecturer, College of Science and Technology, Hebron UniversityVerified email at hebron.edu
- Dr. Ahmed MasriSenior Researcher/Simulation Specialist @ Nokia Standards- FinlandVerified email at nokia.com
- Hedaia GhannamUniversity College LondonVerified email at ucl.ac.uk
- Raed MeslehProfessor of Electrical Engineering, German Jordanian UniversityVerified email at gju.edu.jo
- Salama IkkiProfessor, Electrical Engineering, Lakehead University, CanadaVerified email at lakeheadu.ca
- Sahel AlounehProfessor, Cybersecurity Program, Al Ain University of Science and Technology (on leave from GJU)Verified email at aau.ac.ae
- Mohamed HamdiUniversity of CarthageVerified email at supcom.rnu.tn
- David HausheerProfessor of Networks and Distributed Systems Lab, Faculty of Computer Science, OVGU MagdeburgVerified email at osola.com
- Thomas BocekUniversity of ZurichVerified email at ifi.uzh.ch
- Olivier FestorUniversité de LorraineVerified email at inria.fr
- Paul PurdomIndiana UniversityVerified email at cs.indiana.edu
Follow
Iyad Tumar
Associate Professor at Electrical and Computer Engineering Dept., Birzeit University
Verified email at birzeit.edu - Homepage