Get my own profile
Public access
View all7 articles
1 article
available
not available
Based on funding mandates
Co-authors
- Soumaia Al AyyatThe American University in CairoVerified email at aucegypt.edu
- Rajendra K RajProfessor of Computer Science, Rochester Institute of TechnologyVerified email at cs.rit.edu
- Khaled HarrasComputer Science Faculty at Carnegie Mellon UniversityVerified email at cs.cmu.edu
- Brett A. BeckerUniversity College DublinVerified email at ucd.ie
- AHMED RAFEAAmerican University in CairoVerified email at aucegypt.edu
- Mostafa HamzaSoftware Engineering, MicrosoftVerified email at ucalgary.ca
- Cruz IzuSchool of Computer Science, The University of AdelaideVerified email at adelaide.edu.au
- Michael RobsonSmith CollegeVerified email at smith.edu
- Juan ChenNational University of Defense Technology, ChinaVerified email at nudt.edu.cn
- Neena ThotaUniversity of Massachusetts, AmherstVerified email at cs.umass.edu
- Shahram RahimiDepartment Head and Professor, Mississippi State UniversityVerified email at cse.msstate.edu
- Aysha AlsaftyLecturer of Computer ScienceVerified email at aucegypt.edu
- Rafik A SalamaUniversity of OxfordVerified email at ndm.ox.ac.uk
- Casey BennettCollege of Computing & Digital Media, DePaul UniversityVerified email at depaul.edu
- Allen ParrishExecutive Director, Alabama Cyber Institute, The University of AlabamaVerified email at ua.edu
- Teresa PereiraLecturer at University of MinhoVerified email at dsi.uminho.pt
- Karen DavisComputer Science and Software Engineering, Miami University (formerly at University of Cincinnati)Verified email at miamioh.edu
- Amgad MadkourMicrosoftVerified email at microsoft.com
- Mohamed AlTantawyAgoloVerified email at agolo.com
- Slim AbdennadherProfessor of Computer Science, German International University in CairoVerified email at giu-uni.de
Follow