Get my own profile
Public access
View all8 articles
5 articles
available
not available
Based on funding mandates
Co-authors
- Yu ZhuangTexas Tech UniversityVerified email at ttu.edu
- Mohammed Saeed AlkatheiriUniversity of JeddahVerified email at uj.edu.sa
- Ahmad O. Aseeri, Ph.D.College of Computer Engineering and Sciences, Prince Sattam bin Abdulaziz University, Saudi ArabiaVerified email at psau.edu.sa
- Bipana ThapaliyaTexas Tech UniversityVerified email at ttu.edu
- Nils WisiolAMDVerified email at nils-wisiol.de
- Jean-Pierre SeifertProfessor for Computer & Communication Security, TU Berlin & T-LabsVerified email at tu-berlin.de
- Meznah A. AlamroAssistant Professor, College of Computer & Information Sciences, Princess Nourah UniversityVerified email at pnu.edu.sa
- Gaoxiang LiTexas Tech UniversityVerified email at ttu.edu
- Faisal S. AlsubaeiAssistant Professor at University of JeddahVerified email at uj.edu.sa
- Muhammad KamranCollege of Computer Science and Engineering, University of Jeddah, KSA.Verified email at uj.edu.sa
- Mohammad AlahmadiUniversity of JeddahVerified email at uj.edu.sa
- Zohreh SafariAssistant Professor at Computer Science Department, ECSUVerified email at ttu.edu
Follow
Khalid T. Mursi
Assistant Professor, College of Computer Science and Engineering, University of Jeddah, Saudi Arabia
Verified email at uj.edu.sa