Get my own profile
Public access
View all3 articles
1 article
available
not available
Based on funding mandates
Co-authors
Mohamed M. DarwishAssociate professor of computer Assiut UniversityVerified email at aun.edu.eg
Mostafa M. FoudaIdaho State University, USAVerified email at isu.edu
AHMAD SALAHUTAS; Zagazig Univeristy [Associate Professor]Verified email at utas.edu.om
Hanaa HamzaTeaching Assistant @ IT Department, Faculty of Computers and Informatics, Zagazig University Verified email at zu.edu.eg
Nabil A. LashinA.Prof. Computer Science and Information Technology, Zagazig University, EgyptVerified email at zu.edu.eg
Asmaa Mohamed KhaledzagazigVerified email at fci.zu.edu.eg
Dr. Mohamed Abd ElazizAssociate Professor, Galala UniversityVerified email at Gu.edu.eg
Mohamed Meselhy EltoukhyUniversity of Jeddah & Computer Science, Suez Canal University, EgyptVerified email at ci.suez.edu.eg
George A. PapakostasProfessor, MLV RG, Department of Computer Science, Democritus University of ThraceVerified email at cs.ihu.gr
Seyedali MirjaliliProfessor, Torrens University Australia, Obuda University, Griffith UniversityVerified email at griffith.edu.au
Walid KhedrProfessor of Cyber Security, College of Computers and Informatics, Zagazig University, EgyptVerified email at zu.edu.eg
Mohammed Ali HafizAssociate Professor in Najran University; PreviouslyVerified email at nu.edu.sa
Follow![Khalid M. Hosny](https://scholar.googleusercontent.com/citations?view_op=view_photo&user=XAtqphwAAAAJ&citpid=2)
Khalid M. Hosny
Professor of Computer Science and Information Technology, Zagazig University, Egypt
Verified email at zu.edu.eg