Követés
Leith Abed
Leith Abed
Assistant Professor in Cyber Security, Middle Technical University
E-mail megerősítve itt: mtu.edu.iq - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Securing cloud storage by transparent biometric cryptography
L Abed, N Clarke, B Ghita, A Alruban
Innovative Security Solutions for Information Technology and Communications …, 2019
122019
Visual cryptography technique based on fft
AM Sagheer, SS Al-Rawi, LH Abed
2011 Developments in E-systems Engineering, 233-237, 2011
52011
Partial crypto-compression for cloud-based photo storage using DCT and Daubechies 4 wavelet
LH Abed, MN Rashid, OM Al Okashi
Int J Tech Phys Probl Eng 52 (14), 193-201, 2022
32022
Visual secret sharing without pixel expansion
AM Sagheer, LH Abed
International Journal of Digital Crime and Forensics (IJDCF) 7 (2), 20-30, 2015
32015
Financial information security using hybrid encryption technique on multi-cloud architecture
MN Rashid, LH Abed, WK Awad
Bulletin of Electrical Engineering and Informatics 11 (6), 3450-3461, 2022
22022
Unconstrained face identification using machine learning classification
SI Ibrahim, DA Hammood, LH Abed
AIP Conference Proceedings 3232 (1), 2024
12024
A developed cryptographic model based on AES cryptosystem
HJ Mohammed, AH Al-Adhami, Y Yaseen, L Abed
AIP Conference Proceedings 2400 (1), 2022
12022
NIDS-ML-PSO: Network Intrusion Detection System based on Machine Learning Classifiers and Particle Swarm Optimization
WG Mahdi, DA Hammood, LH Abed, SA Sameer
Journal of Al-Qadisiyah for Computer Science and Mathematics 16 (4), 264–276 …, 2024
2024
A comprehensive review of cancelable biometrics for cybersecurity solutions
SI Ibrahim, DA Hammood, LH Abed
AIP Conference Proceedings 3232 (1), 2024
2024
COVID-19 detection based on combined domain features
OM Al Okashi, IT Ahmed, LH Abed
Indonesian Journal of Electrical Engineering and Computer Science 26 (2 …, 2022
2022
PHISHING IDENTIFICATION THROUGH UP-TO-DATE FEATURES GENERATION AND EXPLORATION
LH Abed, HJ Mohammed, YS Yaseen
Enabling Secure Cloud Storage through Transparent Authentication
L Abed, N Clarke, B Ghita
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–12