Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
Mahmoud BekhitLecturer at Australian Catholic UniversityVerified email at acu.edu.au
AHMAD SALAHUTAS; Zagazig Univeristy; Hunan UniversityVerified email at hnu.edu.cn
Walaa Hassan El-AshmawiFaculty of Computers and Informatics, Suez Canal UniversityVerified email at ci.suez.edu.eg
Tarek GaberSenior Lecturer in Cybersecurity, University of Salford, UK & Asso. Prof., Suez Canal University, EGVerified email at salford.ac.uk
Ayman NabilAssistant Professor of Computer Science, Misr international UniversityVerified email at miuegypt.edu.eg
Mariem AyediCollege of Computer Science and Engineering Alkharj _PSAUVerified email at psau.edu.sa
Dr. Eng. Ahmed S. SalamaResearcherVerified email at fue.edu.eg
Ahmed AliCollege of Engineering and Computer Science, Prince Sattam Bin Abdulaziz UniversityVerified email at psau.edu.sa
Ahmed Fathalla (ORCID: 0000-0001-5...Department of Mathematics, Faculty of Science,Suez Canal University, Ismailia, Egypt.Verified email at science.suez.edu.eg
Follow
Esraa Eldesouky
College of Engineering and Computer Science, Prince Sattam Bin Abdulaziz University
Verified email at psau.edu.sa