Get my own profile
Public access
View all2 articles
0 articles
available
not available
Based on funding mandates
Co-authors
- AHMED ALSHEIKHYِAssociate Professor in Electrical Engineering Dept., College of Engineering, Northern BorderVerified email at nbu.edu.sa
- Yahia SaidNorthern Border University, Saudi ArabiaVerified email at fsm.rnu.tn
- Ali ElgharianiWireless Comm. System Engineer at XCOM LABSVerified email at xcom-labs.com
- A. Khuzaim AlzahraniNothern Border UniversityVerified email at nbu.edu.sa
- Yahya JavedPurdue University, West Lafayette INVerified email at purdue.edu
- Muhamad FelembanIRC for Intelligent Secure Systems Assistant and Computer Engineering Dept, KFUPMVerified email at kfupm.edu.sa
- Nathan BurowMIT Lincoln LaboratoryVerified email at ll.mit.edu
- Rakesh B BobbaOregon State UniversityVerified email at oregonstate.edu
- Robin BerthierUniversity of IllinoisVerified email at illinois.edu
- Saurabh BagchiElectrical and Computer Engineering, Computer Science; Director Army A2I2 & CRISP; Purdue UniversityVerified email at purdue.edu
- Mosab KhayatUmm Al-Qura UniversityVerified email at uqu.edu.sa
- Hassan LahzaAssistant Professor in Cybersecurity at Umm Al-Qura UniversityVerified email at uqu.edu.sa
- Ahmad S. AzzahraniAssistant ProfessorVerified email at nbu.edu.sa
- Abdulrahman AlmutairiProfessor of Computer Engineering, King Saud UniversityVerified email at ksu.edu.sa