Intelligence and electronic warfare: Challenges and future trends

A Al-Khawaja, SB Sadkhan - 2021 7th International …, 2021 - ieeexplore.ieee.org
the subjective evaluation of electronic intelligence and warfare has been adopted as
quantitive analysis by many organizational bodies to assess defense systems capabilities …

A proposed ANFIS evaluator for RSA cryptosystem used in cloud networking

SB Sadkhan, FH Abdulraheem - … International Conference on …, 2017 - ieeexplore.ieee.org
The security aspect is considered as the most important challenge in communication and
computer networks. Therefore the “security level evaluation” of cryptosystem, is very …

Cryptosystem security evaluation based on diagonal game and information theory

SB Sadkhan, DM Reda - 2018 International Conference on …, 2018 - ieeexplore.ieee.org
security evaluation of cryptosystem is a critical topic in cryptology. It is used to differentiate
among cryptosystems' security. The aim of this paper is to produce a new model for security …

Security evaluation of cryptosystems used in cloud networks

SB Sadkhan, FH Abdulraheem - 2016 Al-Sadeq International …, 2016 - ieeexplore.ieee.org
Cloud networking is the next generation architecture of IT. Clouds are very complex
architectures. They have a replicated thousands of times, and common functional units and …

Digital Filter Performance Based on Squared Error

AT Alsahlanee - 2021 International Conference on Advanced …, 2021 - ieeexplore.ieee.org
A digital filter with infinite impulse response (IIR) was designed using the hybrid optimization
methodology. The algorithm used is a dynamic-static topology of particle swarm optimization …

Security of Cloud Networks–Status, Challenges and Future Trends

SB Sadkhan - 2022 8th International Engineering Conference …, 2022 - ieeexplore.ieee.org
Cloud based Network allows the sharing of resources which includes network, applications,
software program and storage via internet. Cloud end-users can rent more than one …

Game Theory Role in Wireless Network Security–Status, Challenges and Future trends

SB Sadkhan, M Ayad - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
As the Internet grows omnipresent in the lives of these people, people rely largely on the
Internet for appropriate communication and quick access to information. The network has …

A support system for autistic children using Internet of Things technology

NM Abdullah, AF AL-Allaf - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Children with Autism Spectrum Disorder (ASD) usually have difficulties expressing or
controlling emotions, and they suffer from impaired eye contact and communication with …

The role of quantum and post-quantum techniques in wireless network security-status, challenges and future trends

SB Sadkhan, R Abbas - 2021 4th International Iraqi Conference …, 2021 - ieeexplore.ieee.org
One of the most essential ways of communication is the wireless network. As a result,
ensuring the security of information transmitted across wireless networks is a critical …

Computations on Cipher Speech for Secure Biometrics

A Dinesh, KE Bijoy - Procedia Computer Science, 2016 - Elsevier
Abstract Signal Processing in Encrypted Domain (SPED) is a blending of signal processing
and cryptography. SPED is a magnificent tool for processing encrypted data. It provides …