Information technology infrastructure and small medium enterprises’ in Iraq HA Al-Lamy, MH Bakry, W Raad, SA Al-Shami, ZJ Alaraji, MW Alsa-Lihi, ... Opcion 34 (86), 1711-1724, 2018 | 36 | 2018 |
A new fog computing resource management (FRM) model based on hybrid load balancing and scheduling for critical healthcare applications AA Mutlag, MK Abd Ghani, O Mohd, KH Abdulkareem, MA Mohammed, ... Physical Communication 59, 102109, 2023 | 17 | 2023 |
Fuzzy theory in fog computing: review, taxonomy, and open issues ZJ Al-Araji, SSS Ahmad, N Kausar, A Farhani, E Ozbilge, T Cagin IEEE Access 10, 126931-126956, 2022 | 16 | 2022 |
Attack graph reachability: concept, analysis, challenges and issues ZJ Al-Araji, SSS Ahmed, RS Abdullah, AA Mutlag, HAA Raheem, ... Network Security 2021 (6), 13-19, 2021 | 15 | 2021 |
Clustering Based Affinity Propagation in VANETs: Taxonomy and Opportunity of Research MS Talib, A Hassan, ZA Abas, A Abdul-hussian, MFA Hassan, ZJ AL-Araji International Journal of Recent Technology and Engineering 7 (6S5), 672-679, 2019 | 14 | 2019 |
Attack prediction to enhance attack path discovery using improved attack graph Z Al-Araji, SS Syed Ahmad, RS Abdullah Karbala International Journal of Modern Science 8 (3), 313-329, 2022 | 10 | 2022 |
Propose vulnerability metrics to measure network secure using attack graph ZJ Al-Araji, SSS Ahmad, RS Abdullah International Journal of Advanced Computer Science and Applications 12 (5), 2021 | 8 | 2021 |
THE ROLE OF WEB DESIGN TOWARDS INFLUENCE PURCHASE INTENTION IN HOTEL INDUSTRY W Raad, N Rashid, HA ALlamy, IS Khalid, SA Al-shami, ZJ Alaraji | 7 | 2018 |
Network Traffic Classification for Attack Detection Using Big Data Tools: A Review ZJ Al-Araji, SS Syed Ahmad, MW Al-Salihi, HA Al-Lamy, M Ahmed, ... Intelligent and Interactive Computing: Proceedings of IIC 2018, 355-363, 2019 | 4 | 2019 |
Truth discovery using the trustchecker algorithm on online quran tafseer ZJ Al-Araji, SS Syed Ahmad, HA Al-Lamy, MW Al-Salihi, SA Al-Shami, ... Intelligent and Interactive Computing: Proceedings of IIC 2018, 71-80, 2019 | 3 | 2019 |
Measuring the Adoption of Ubiquitous Technology Towards Online Purchase Intention in Hotel Industry H ALlamy, SA Al-Shami, N Sarli, N Rashid, N Raad, ZJ Alaraji The Turkish Online Journal of Design, Art and Communication, Special Edition …, 2018 | 2* | 2018 |
Attack graph-based security metrics: Concept, taxonomy, challenges and open issues ZJ Al-Araji, SSS Ahmad, HM Farhood, AA Mutlag, MS Al-Khaldee BIO Web of Conferences 97, 00085, 2024 | 1 | 2024 |
Implement Edge pruning to Enhance attack graph generation using Naïve approach algorithm Z Alaaraji, A Mutlag, SSS Ahmad El-Cezeri 11 (3), 298-306, 2024 | | 2024 |
The Determinants of Information Technology Towards Innovation Performance in Iraqi SMEs A Hayder, SA Al-shami, W Raad, N Rashid, Z Jasim | | 2019 |
Design of Multi-Band Matched Bandstop Filter MH Al-Taweel, BH Ahmad, MR Ahmad, TR Al-Shaikhli, MM Al-Saeedi | | 2018 |