Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
- Chadi AssiIEEE Fellow, Professor, Concordia UniversityVerified email at ciise.concordia.ca
- Ribal AtallahConcordia UniversityVerified email at encs.concordia.ca
- Mourad DebbabiDean, and Concordia Hydro-Québec Hitachi Partnership Research Chair, Professor, Concordia Univ.Verified email at ciise.concordia.ca
- Khaled Sarieddine, Ph.D.Researcher, Concordia UniversityVerified email at mail.concordia.ca
- Sadegh TorabiCyber Security Researcher, Center for Secure Information Systems (CSIS), George Mason UniversityVerified email at gmu.edu
- Harag MargossianLebanese American UniversityVerified email at lau.edu.lb
- Zahi NakadLebanese American UniversityVerified email at lau.edu.lb
- Wissam FawazProfessor of Computer Engineering, Lebanese American UniversityVerified email at lau.edu.lb
- Mohsen GhafouriAssistant Professor, Concordia UniversityVerified email at concordia.ca
- Danial JafarigivResearcher, Hydro-Quebec Research InstituteVerified email at polymtl.ca
- Maurice Khabbaz, Ph.D.American University of BeirutVerified email at aub.edu.lb
- Mohamed ElhattabPhD, Concordia University, Montreal, Quebec, CanadaVerified email at encs.concordia.ca
- Elias Bou-HarbLouisiana State UniversityVerified email at lsu.edu
- Joseph KhouryLouisiana State UniversityVerified email at lsu.edu
- Mohamed Amine ArfaouiReseracher, Interdigital Inc.Verified email at interdigital.com
- Morteza Safaei PourSan Diego State UniversityVerified email at sdsu.edu