A neural network based anomaly intrusion detection system STF Al-Janabi, HA Saeed 2011 Developments in E-systems Engineering, 221-226, 2011 | 93 | 2011 |
Investigation of Java Smart Card Technology for Multi-Task Applications ST Faraj, NE Berbat, SGA Ali J of Al-Anbar University for Pure Science 2 (1), 23, 2008 | 73 | 2008 |
Survey on intrusion detection systems based on deep learning AAA Lateef, S Al-Janabi, B Al-Khateeb Periodicals of Engineering and Natural Sciences 7 (3), 1074-1095, 2019 | 66 | 2019 |
Public-key cryptography enabled kerberos authentication STF Al-Janabi, MA Rasheed 2011 Developments in E-systems Engineering, 209-214, 2011 | 48 | 2011 |
Secure Data Computation Using Deep Learning and Homomorphic Encryption: A Survey. AA Al-Janabi, STF Al-Janabi, B Al-Khateeb International Journal of Online & Biomedical Engineering 19 (11), 2023 | 33 | 2023 |
Development of certificate authority services for web applications SF Al-Janabi, AK Obaid 2012 International Conference on Future Communication Networks, 135-140, 2012 | 31 | 2012 |
Multi-controllers placement optimization in sdn by the hybrid hsa-pso algorithm NS Radam, STF Al-Janabi, KS Jasim Computers 11 (7), 111, 2022 | 28 | 2022 |
Electricity-theft detection in smart grid based on deep learning N Ibrahim, S Al-Janabi, B Al-Khateeb Bulletin of Electrical Engineering and Informatics 10 (4), 2285-2292, 2021 | 22 | 2021 |
A novel extension of SSL/TLS based on quantum key distribution ST Faraj 2008 International Conference on Computer and Communication Engineering, 919-922, 2008 | 21 | 2008 |
Combining Mediated and Identity-Based Cryptography for Securing E-Mail. STF Al-Janabi, HK Abd-Alrazzaq DEIS, 1-15, 2011 | 20* | 2011 |
Multidisciplinary perspectives in cryptology and information security SB Sadkhan Al Maliky IGI Global, 2014 | 17* | 2014 |
Classification and identification of classical cipher type using artificial neural networks AJ Abd, S Al-Janabi Journal of Engineering and Applied Sciences 14 (11), 3549-3556, 2019 | 16 | 2019 |
Intelligent techniques in cryptanalysis: Review and future directions ST Al-Janabi, B Al-Khateeb, AJ Abd UHD Journal of Science and Technology 1 (1), 1-10, 2017 | 13 | 2017 |
Query reformulation using WordNet and genetic algorithm B Al-Khateeb, AJ Al-Kubaisi, ST Al-Janabi 2017 Annual Conference on New Trends in Information & Communications …, 2017 | 13 | 2017 |
A Review on E-Voting Based on Blockchain Models SAB Salman, S Al-Janabi, AM Sagheer Iraqi Journal of Science, 1362-1375, 2022 | 12 | 2022 |
Strategic plan for enhancing higher education computing degree programs in Iraq S Al-Janabi, JE Urban 2011 IEEE Global Engineering Education Conference (EDUCON), 94-100, 2011 | 9 | 2011 |
Reforming the Higher Education System in Iraq: Internationalization via Decentralization. STF Al-Janabi, D Anderson Journal of Educational Technology 8 (3), 1-14, 2011 | 9 | 2011 |
Security attacks on e-voting system using blockchain SA Salman, SA Janabi, AM Sagheer Iraqi Journal for Computer Science and Mathematics 4 (2), 16, 2023 | 8 | 2023 |
Valid Blockchain-Based E-Voting Using Elliptic Curve and Homomorphic Encryption. SAB Salman, S Al-Janabi, AM Sagheer International Journal of Interactive Mobile Technologies 16 (20), 2022 | 7 | 2022 |
Optimisation Methods for the Controller Placement Problem in SDN: A Survey NS Radam, S Al-Janabi, K Shaker Webology, 2022 | 7 | 2022 |