|
thomson |
2022-05 |
TEM Journal |
أ.د . أحمد هاشم محمد |
Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation |
1 |
|
scopus |
2022-08 |
TELKOMNIKA (Telecommunication Computing Electronics and Control) |
أ.د . أحمد هاشم محمد |
A security services for internet of thing smart health care solutions based blockchain technology |
2 |
|
scopus |
2022-03 |
International Journal of Intelligent Engineering and Systems |
أ.د . أحمد هاشم محمد |
Image Cryptosystem for IoT Devices Using 2-D Zaslavsky Chaotic Map |
3 |
|
scopus |
2019-02 |
2nd International Conference on Electrical, Communication, Computer, Power and Control Engineering, ICECCPCE 2019 |
أ.د . أحمد هاشم محمد |
Security and Privacy in the Internet of Things (IoT): Survey |
4 |
|
scopus |
2021-10 |
Karbala International Journal of Modern Science |
أ.د . أحمد هاشم محمد |
A new chaotic image cryptosystem based on plaintext-associated mechanism and integrated confusion-diffusion operation |
5 |
|
scopus |
2021-11 |
UPB Scientific Bulletin, Series C: Electrical Engineering and Computer Sciencethis link is disabled |
أ.د . أحمد هاشم محمد |
A security services of proposed social web of things |
6 |
|
scopus |
2021-10 |
1st Babylon International Conference on Information Technology and Science 2021, BICITS 2021 |
أ.د . أحمد هاشم محمد |
Review: Security Challenges and Cyber-Attacks for Internet of Things |
7 |
|
scopus |
2021-12 |
International Conference on Communication and Information Technology, ICICT 2021 |
أ.د . أحمد هاشم محمد |
Solve Polyalphabetic Cipher Based on Intelligent System |
8 |
|
scopus |
2022-02 |
Telkomnika (Telecommunication Computing Electronics and Control) |
أ.د . أحمد هاشم محمد |
Optimized load balance scheduling algorithm |
9 |
|
local |
2015-08-10 |
Journal College of engineering |
أ.د . أحمد هاشم محمد |
Cloud Based Secure Web Application |
10 |
|
local |
2009-11-29 |
Journal College of education |
أ.د . أحمد هاشم محمد |
Improving QoS of Real Time Traffic in WLAN |
11 |
|
local |
2010-05-02 |
IBN AL-HAITHAM Journal for Pure and APP . SCI. |
أ.د . أحمد هاشم محمد |
Proposed Method to Prevent SQL Injection |
12 |
|
local |
2010-10-24 |
Journal of the College of basic education |
أ.د . أحمد هاشم محمد |
Segmentation of Color Image |
13 |
|
local |
2011-10-16 |
AL-Ma’moon College Journal |
أ.د . أحمد هاشم محمد |
Disclosure E-Mail of Phishing Website |
14 |
|
local |
2011-02-21 |
Proceedings of the 18th Conference on College of education (IC2IT2014) |
أ.د . أحمد هاشم محمد |
Encryption and Authentication of Instant Message |
15 |
|
science |
2013-03-07 |
Iraqi association of international technology |
أ.د . أحمد هاشم محمد |
A SURVEY OF CLOUD BASED SECURED WEB APPLICATION |
16 |
|
local |
2014-04-03 |
Iraqi association of international technology |
أ.د . أحمد هاشم محمد |
Detect and Prevent SQLIA by Dynamic Monitoring |
17 |
|
local |
2016-12-27 |
Journal College of education |
أ.د . أحمد هاشم محمد |
Secure Source Code Based on Secure Control Flow Path |
18 |