.

-


البحوث الرصينة

رابط البحث قاعدة البيانات تاريخ النشر اسم المجلة اسم الباحث عنوان البحث ت
thomson 2022-05 TEM Journal . Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation 1
scopus 2022-08 TELKOMNIKA (Telecommunication Computing Electronics and Control) . A security services for internet of thing smart health care solutions based blockchain technology 2
scopus 2022-03 International Journal of Intelligent Engineering and Systems . Image Cryptosystem for IoT Devices Using 2-D Zaslavsky Chaotic Map 3
scopus 2019-02 2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering, ICECCPCE 2019 . Security and Privacy in the Internet of Things (IoT): Survey 4
scopus 2021-10 Karbala International Journal of Modern Science . A new chaotic image cryptosystem based on plaintext-associated mechanism and integrated confusion-diffusion operation 5
scopus 2021-11 UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Sciencethis link is disabled . A security services of proposed social web of things 6
scopus 2021-10 1st Babylon International Conference on Information Technology and Science 2021, BICITS 2021 . Review: Security Challenges and Cyber-Attacks for Internet of Things 7
scopus 2021-12 International Conference on Communication and Information Technology, ICICT 2021 . Solve Polyalphabetic Cipher Based on Intelligent System 8
scopus 2022-02 Telkomnika (Telecommunication Computing Electronics and Control) . Optimized load balance scheduling algorithm 9
local 2015-08-10 Journal College of engineering . Cloud Based Secure Web Application 10
local 2009-11-29 Journal College of education . Improving QoS of Real Time Traffic in WLAN 11
local 2010-05-02 IBN AL-HAITHAM Journal for Pure and APP . SCI. . Proposed Method to Prevent SQL Injection 12
local 2010-10-24 Journal of the College of basic education . Segmentation of Color Image 13
local 2011-10-16 AL-Ma’moon College Journal . Disclosure E-Mail of Phishing Website 14
local 2011-02-21 Proceedings of the 18th Conference on College of education (IC2IT2014) . Encryption and Authentication of Instant Message 15
science 2013-03-07 Iraqi association of international technology . A SURVEY OF CLOUD BASED SECURED WEB APPLICATION 16
local 2014-04-03 Iraqi association of international technology . Detect and Prevent SQLIA by Dynamic Monitoring 17
local 2016-12-27 Journal College of education . Secure Source Code Based on Secure Control Flow Path 18