Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods BA Khalaf, SA Mostafa, A Mustapha, MA Mohammed, WM Abduallah IEEE Access, 2019 | 199 | 2019 |
Acute lymphoblastic leukemia segmentation using local pixel information SS Al-jaboriy, NNA Sjarif, S Chuprat, WM Abduallah Pattern Recognition Letters 125, 85-90, 2019 | 89 | 2019 |
Modelling an adjustable autonomous multi-agent internet of things system for elderly smart home SA Mostafa, SS Gunasekaran, A Mustapha, MA Mohammed, ... Advances in Neuroergonomics and Cognitive Engineering: Proceedings of the …, 2020 | 69 | 2020 |
Idps: An integrated intrusion handling model for cloud HM Alsafi, WM Abduallah, ASK Pathan arXiv preprint arXiv:1203.3323, 2012 | 48 | 2012 |
Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach WM Abduallah, AMS Rahma, ASK Pathan Computers & Electrical Engineering 40 (4), 1390-1404, 2014 | 43 | 2014 |
A review on recent steganography techniques in cloud computing OM Ahmed, WM Abduallah Academic Journal of Nawroz University 6 (3), 106-111, 2017 | 29 | 2017 |
Stego-Based-Crypto Technique for High Security Applications AMA Brifcani, WMA Brifcani International Association of Computer Science and Information Technology …, 2010 | 23 | 2010 |
GPUs Impact on Parallel Shared Memory Systems Performance OMA LAILAN M. HAJI, RIZGAR R. ZEBARI , SUBHI R.M. ZEEBAREE, WAFAA MUSTAFA ... International Journal of Psychosocial Rehabilitation 24 (8), 8030-8038, 2020 | 21* | 2020 |
A review on steganography techniques WM Abduallah, AMS Rahma American Scientific Research Journal for Engineering, Technology, and …, 2016 | 20 | 2016 |
Real time implementation of stegofirewall system MR Al-Sultan, SY Ameen, WM Abduallah International Journal of Computing and Digital Systems 8 (5), 498-504, 2019 | 18 | 2019 |
New Data hiding method based on DNA and Vigenere Autokey WM Abduallah, SRM Zeebaree Academic Journal of Nawroz University 6 (3), 83-88, 2017 | 16 | 2017 |
An efficient ElGamal cryptosystem scheme HI Hussein, WM Abduallah International Journal of Computers and Applications 43 (10), 1088-1094, 2021 | 10 | 2021 |
A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks ASK Pathan, WM Abduallah, S Khanam, HY Saleem Simulation 89 (5), 616-634, 2013 | 6 | 2013 |
A modified table lookup substitution method for hiding data in DNA HI Hussein, WM Abduallah 2018 International Conference on Advanced Science and Engineering (ICOASE …, 2018 | 4 | 2018 |
A Review of Intrusion Detection Systems HK Shaikha, WM Abduallah Academic Journal of Nawroz University 6 (3), 101-105, 2017 | 4 | 2017 |
Reversible data hiding scheme based on 3-least significant bits and mix column transform WM Abduallah, AMS Rahma, ASK Pathan Security and Privacy in Communication Networks: 9th International ICST …, 2013 | 4 | 2013 |
A smart home design based on ethernet WM Abduallah, RZ Mahmood, DM Abdullah Academic Journal of Nawroz University 6 (3), 59-63, 2017 | 3 | 2017 |
A new data hiding technique based on irreducible polynomials WM Abduallah, AMS Rahma, ASK Pathan Journal of Emerging Technologies in Web Intelligence 5 (1), 2013 | 3 | 2013 |
Coverless Image Steganography SF Khorshid, WM Abdullah Academic Journal of Nawroz University 11 (3), 314-326, 2022 | 2 | 2022 |
Tackling Intruders in Wireless Mesh Networks ASK Pathan, S Khanam, HY Saleem, WM Abduallah Distributed Network Intelligence, Security and Applications. CRC Press …, 2013 | 2 | 2013 |