Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Alaa Eddien AbdallahProfessor of Computer Science, Hashemite UniversityVerified email at hu.edu.jo
Ahmed Fawzi OtoomProfessor, The Hashemite UniversityVerified email at hu.edu.jo
Mohammad BsoulProfessor of Computer Science, The Hashemite UniversityVerified email at hu.edu.jo
A. Ben HamzaProfessor, Information Systems Engineering, Concordia UniversityVerified email at ciise.concordia.ca
Yousef KilaniProf. of Computer Information Systems, Hashemite University, JordanVerified email at hu.edu.jo
Maen HammadDepartment of Software Engineering, The Hashemite University, Zarqa, JordanVerified email at hu.edu.jo
Ahmad Al-KhasawnehProfessor of Information Systems Science, Hashemite UniversityVerified email at hu.edu.jo
Nedal tahatProfessor of mathematics , The Hashemite UniversityVerified email at hu.edu.jo
Essam Al daoudProfessor of Computer Science, Zarqa UniversityVerified email at zu.edu.jo
Ayoub AlsarhanProfessor of Cyber Security, Hashemite UniversityVerified email at hu.edu.jo
Ibrahim al-oqilyProfessor of Computer Science, The Hashemite UniversityVerified email at hu.edu.jo
Izzat Alsmadi: IEEE Senior memberTexas A&M San AntonioVerified email at tamusa.edu
Sahar IdwanProfessor - The Hashemite UniversityVerified email at hu.edu.jo
Follow![Emad E. Abdallah](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=IUqm8MkAAAAJ&citpid=11)
Emad E. Abdallah
Professor of Information System Security, Hashemite University
Verified email at hu.edu.jo - Homepage