A neural network based anomaly intrusion detection system STF Al-Janabi, HA Saeed 2011 Developments in E-systems Engineering, 221-226, 2011 | 94 | 2011 |
Investigation of Java Smart Card Technology for Multi-Task Applications ST Faraj, NE Berbat, SGA Ali J of Al-Anbar University for Pure Science 2 (1), 23, 2008 | 74 | 2008 |
Survey on intrusion detection systems based on deep learning AAA Lateef, S Al-Janabi, B Al-Khateeb Periodicals of Engineering and Natural Sciences 7 (3), 1074-1095, 2019 | 66 | 2019 |
Public-key cryptography enabled kerberos authentication STF Al-Janabi, MA Rasheed 2011 Developments in E-systems Engineering, 209-214, 2011 | 52 | 2011 |
Secure Data Computation Using Deep Learning and Homomorphic Encryption: A Survey. AA Al-Janabi, STF Al-Janabi, B Al-Khateeb International Journal of Online & Biomedical Engineering 19 (11), 2023 | 33 | 2023 |
Development of certificate authority services for web applications SF Al-Janabi, AK Obaid 2012 International Conference on Future Communication Networks, 135-140, 2012 | 29 | 2012 |
Multi-controllers placement optimization in sdn by the hybrid hsa-pso algorithm NS Radam, STF Al-Janabi, KS Jasim Computers 11 (7), 111, 2022 | 27 | 2022 |
Combining Mediated and Identity-Based Cryptography for Securing E-Mail. STF Al-Janabi, HK Abd-Alrazzaq DEIS, 1-15, 2011 | 24* | 2011 |
Electricity-theft detection in smart grids based on deep learning NM Ibrahim, STF Al-Janabi, B Al-Khateeb Bulletin of Electrical Engineering and Informatics 10 (4), 2285-2292, 2021 | 21 | 2021 |
A novel extension of SSL/TLS based on quantum key distribution ST Faraj 2008 International Conference on Computer and Communication Engineering, 919-922, 2008 | 21 | 2008 |
Classification and identification of classical cipher type using artificial neural networks AJ Abd, S Al-Janabi Journal of Engineering and Applied Sciences 14 (11), 3549-3556, 2019 | 16 | 2019 |
Multidisciplinary perspectives in cryptology and information security SB Sadkhan Al Maliky IGI Global, 2014 | 16* | 2014 |
Intelligent techniques in cryptanalysis: Review and future directions ST Al-Janabi, B Al-Khateeb, AJ Abd UHD Journal of Science and Technology 1 (1), 1-10, 2017 | 14 | 2017 |
Query reformulation using WordNet and genetic algorithm B Al-Khateeb, AJ Al-Kubaisi, ST Al-Janabi 2017 annual conference on new trends in information & communications …, 2017 | 13 | 2017 |
A review on e-voting based on blockchain models SAB Salman, S Al-Janabi, AM Sagheer Iraqi Journal of Science, 1362-1375, 2022 | 11 | 2022 |
Strategic plan for enhancing higher education computing degree programs in Iraq S Al-Janabi, JE Urban 2011 IEEE Global Engineering Education Conference (EDUCON), 94-100, 2011 | 9 | 2011 |
Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher STF Al-Janabi, KS Rijab, AM Sagheer 2011 Developments in E-systems Engineering, 413-418, 2011 | 8 | 2011 |
Security attacks on e-voting system using blockchain SA Salman, SA Janabi, AM Sagheer Iraqi Journal for Computer Science and Mathematics 4 (2), 16, 2023 | 7 | 2023 |
Valid Blockchain-Based E-Voting Using Elliptic Curve and Homomorphic Encryption. SAB Salman, S Al-Janabi, AM Sagheer International Journal of Interactive Mobile Technologies 16 (20), 2022 | 7 | 2022 |
Microsoft Azure IoT-based edge computing for smart homes AH Shehab, STF Al-Janabi 2020 International Conference on Decision Aid Sciences and Application (DASA …, 2020 | 7 | 2020 |