An energy-efficient RAM cell based on novel majority gate in QCA technology AH Majeed, E AlKaldy, S Albermany SN Applied Sciences 1 (11), 1354, 2019 | 29 | 2019 |
Improving extreme learning machine accuracy utilizing genetic algorithm for intrusion detection purposes AJ Obaid, KA Alghurabi, SAK Albermany, S Sharma Research in Intelligent and Computing in Engineering: Select Proceedings of …, 2021 | 20 | 2021 |
A secure MAC protocol for cognitive radio networks (SMCRN) W Alhakami, A Mansour, GA Safdar, S Albermany 2013 Science and Information Conference, 796-803, 2013 | 19 | 2013 |
Keyless security in wireless networks SA Albermany, GA Safdar Wireless personal communications 79, 1713-1731, 2014 | 13 | 2014 |
Enhancement in S-Box of BRADG algorithm AJ Oabid, S AlBermany, NO Alkaam Intelligent Computing in Engineering: Select Proceedings of RICE 2019, 737-745, 2020 | 11 | 2020 |
New random block cipher algorithm SAK Albermany, FR Hamade, GA Safdar 2017 International Conference on Current Research in Computer Science and …, 2017 | 9 | 2017 |
Shaping the Future of ICT: Trends in Information Technology, Communications Engineering, and Management IMM El Emary, A Brzozowska Crc Press, 2017 | 8 | 2017 |
Survey: block cipher methods S Albermany, F Radihamade Int. J. Adv. Res. Technol 5 (11), 11-22, 2016 | 8 | 2016 |
Prevention against threats to self co-existence-a novel authentication protocol for cognitive radio networks GA Safdar, S Albermany, N Aslam, A Mansour, G Epiphaniou 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC), 1-6, 2014 | 6 | 2014 |
RADG design on Elliptic Curve Cryptography SA Albermany, AH Alwan | 4 | 2016 |
EEG authentication system using fuzzy vault scheme S Albermany, FM Baqer Journal of Discrete Mathematical Sciences and Cryptography 25 (8), 2405-2410, 2022 | 3 | 2022 |
Energy Theft Detection and Preventive Measures for IoT Using Machine Learning MH Alameady, S Albermany, LE George Mathematical Statistician and Engineering Applications, 155-168, 2022 | 3 | 2022 |
Performance of Differential CSK under Color Noise: A Comparison with CSK RI Hussein, ZM Hussain, SA Albermany Journal of Engineering and Applied Sciences 15 (1), 48-59, 2020 | 3 | 2020 |
New Block Cipher Key with RADG Automata FR Salah Albermany Journal of Engineering and Applied Sciences 14, 3866-3876, 2019 | 3* | 2019 |
Proposed method to generated strong keys by fuzzy extractor and biometric H Saleem, S Albermany, H Hadi Int. J. Eng. Technol. 7, 129-131, 2018 | 3 | 2018 |
Intrusion detection in the IoT-fog adopting the GRU and CNN: a deep learning-based approach ZM Al-Khuzaie, SAK Albermany, MA AbdlNibe Micro-Electronics and Telecommunication Engineering: Proceedings of 6th …, 2023 | 2 | 2023 |
Energy theft detection with determine date theft period for state grid corporation of china dataset MH Alameady, LE George, S Albermany International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 2 | 2023 |
The Use of SSL and TLS Protocols in Providing a Secure Environment for e-commerce Sites. MA Sayal, MH Alameady, SA Albermany Webology 17 (2), 2020 | 2 | 2020 |
CRADG: A chaotic RADG security system S Albermany, M Nathim, ZM Hussain Journal of Engineering and Applied Sciences 12 (16), 4118-4122, 2017 | 2 | 2017 |
A Technique for Classifying and Retrieving of Malware Detials in Signtures Based S Albermany American Scientific Research Journal for Engineering, Technology, and …, 2016 | 2 | 2016 |