Sledovat
Zaid J. Al-Araji
Zaid J. Al-Araji
PhD in IT
E-mailová adresa ověřena na: uoninevah.edu.iq - Domovská stránka
Název
Citace
Citace
Rok
Information technology infrastructure and small medium enterprises’ in Iraq
HA Al-Lamy, MH Bakry, W Raad, SA Al-Shami, ZJ Alaraji, MW Alsa-Lihi, ...
Opcion 34 (86), 1711-1724, 2018
362018
A new fog computing resource management (FRM) model based on hybrid load balancing and scheduling for critical healthcare applications
AA Mutlag, MK Abd Ghani, O Mohd, KH Abdulkareem, MA Mohammed, ...
Physical Communication 59, 102109, 2023
172023
Fuzzy theory in fog computing: review, taxonomy, and open issues
ZJ Al-Araji, SSS Ahmad, N Kausar, A Farhani, E Ozbilge, T Cagin
IEEE Access 10, 126931-126956, 2022
162022
Attack graph reachability: concept, analysis, challenges and issues
ZJ Al-Araji, SSS Ahmed, RS Abdullah, AA Mutlag, HAA Raheem, ...
Network Security 2021 (6), 13-19, 2021
152021
Clustering Based Affinity Propagation in VANETs: Taxonomy and Opportunity of Research
MS Talib, A Hassan, ZA Abas, A Abdul-hussian, MFA Hassan, ZJ AL-Araji
International Journal of Recent Technology and Engineering 7 (6S5), 672-679, 2019
142019
Attack prediction to enhance attack path discovery using improved attack graph
Z Al-Araji, SS Syed Ahmad, RS Abdullah
Karbala International Journal of Modern Science 8 (3), 313-329, 2022
102022
Propose vulnerability metrics to measure network secure using attack graph
ZJ Al-Araji, SSS Ahmad, RS Abdullah
International Journal of Advanced Computer Science and Applications 12 (5), 2021
82021
THE ROLE OF WEB DESIGN TOWARDS INFLUENCE PURCHASE INTENTION IN HOTEL INDUSTRY
W Raad, N Rashid, HA ALlamy, IS Khalid, SA Al-shami, ZJ Alaraji
72018
Network Traffic Classification for Attack Detection Using Big Data Tools: A Review
ZJ Al-Araji, SS Syed Ahmad, MW Al-Salihi, HA Al-Lamy, M Ahmed, ...
Intelligent and Interactive Computing: Proceedings of IIC 2018, 355-363, 2019
42019
Truth discovery using the trustchecker algorithm on online quran tafseer
ZJ Al-Araji, SS Syed Ahmad, HA Al-Lamy, MW Al-Salihi, SA Al-Shami, ...
Intelligent and Interactive Computing: Proceedings of IIC 2018, 71-80, 2019
32019
Measuring the Adoption of Ubiquitous Technology Towards Online Purchase Intention in Hotel Industry
H ALlamy, SA Al-Shami, N Sarli, N Rashid, N Raad, ZJ Alaraji
The Turkish Online Journal of Design, Art and Communication, Special Edition …, 2018
2*2018
Attack graph-based security metrics: Concept, taxonomy, challenges and open issues
ZJ Al-Araji, SSS Ahmad, HM Farhood, AA Mutlag, MS Al-Khaldee
BIO Web of Conferences 97, 00085, 2024
12024
Implement Edge pruning to Enhance attack graph generation using Naïve approach algorithm
Z Alaaraji, A Mutlag, SSS Ahmad
El-Cezeri 11 (3), 298-306, 2024
2024
The Determinants of Information Technology Towards Innovation Performance in Iraqi SMEs
A Hayder, SA Al-shami, W Raad, N Rashid, Z Jasim
2019
Design of Multi-Band Matched Bandstop Filter
MH Al-Taweel, BH Ahmad, MR Ahmad, TR Al-Shaikhli, MM Al-Saeedi
2018
Systém momentálně nemůže danou operaci provést. Zkuste to znovu později.
Články 1–15