2013
|
SIMULATION:
Transactions of The
Society for Modeling and Simulation
International, DOI:
10.1177/00375497124
67827, Volume 89, Issue 5
|
A Pay-and-Stay Model for Tackling Intruders in Hybrid Wireless Mesh Networks
|
2013
|
International
Conference on
Advanced Computer
Science Applications and Technologies – ACSAT2013
(IEEE)
|
Data Hiding within Color Images based on MCT with X-OR Operations
|
2013
|
Springer, 2013
|
Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform
|
2013
|
Journal of Emerging
Technologies in Web
Intelligence, Academy Publisher, Volume 5, No. 1.
|
A New Data Hiding Technique Based on Irreducible Polynomials
|
2014
|
Computers and
Electrical
Engineering, Volume
40, Issue 4, 2014, Elsevier
|
Mix Column Transform based on Irreducible Polynomial
Mathematics for Color Image Steganography : A Novel Approach
|
2016
|
American Scientific
Research Journal for
Engineering,
Technology,& Sciences, published by (GSSRR).
Volume 24, Number 1
|
A Review On Steganography Techniques
|
2017
|
Journal of Theoretical
& Applied Information Technology.
Volume 95, issue 23
|
Data-Dependent In Role-Based Goal Modeling
|
2017
|
Academic Journal of Nawroz University.
Volume 6, issue 3
|
A Review of Intrusion Detection Systems
|
2017
|
Academic Journal of Nawroz University.
Volume 6, issue 3
|
New Data hiding method based on DNA and Vigenere Autokey
|
2017
|
Academic Journal of Nawroz University.
Volume 6, issue 3
|
A Review on Recent Steganography Techniques in Cloud Computing
|
2017
|
Academic Journal of Nawroz University.
Volume 6, issue 3
|
A Smart Home Design Based on Ethernet
|
2018
|
IEEE,
2018 International Conference on
Advanced Science and Engineering
(ICOASE)
|
A Modified Table Lookup Substitution Method for Hiding Data in DNA
|
2019
|
Springer, Cham,
International
Conference on
Applied Human
Factors and
Ergonomics
|
Modelling an Adjustable Autonomous Multi-agent Internet of Things System for Elderly Smart Home
|
2019
|
Pattern Recognition
Letters.
Volume 125
|
Acute lymphoblastic leukemia segmentation using local pixel information
|
2019
|
IEEE Access. Volume 7
|
Comprehensive Review of Artificial Intelligence and Statistical
Approaches in Distributed Denial of Service Attack and Defense Methods
|
2019
|
International Journal of Computers and
Applications ،2019
|
An efficient ElGamal cryptosystem scheme
|
2019
|
International Journal of Computing and Digital Systems.
Volume 8, issue 5
|
Real Time Implementation of Stegofirewall System
|
2020
|
International Journal
of Psychosocial
Rehabilitation Volume
24, issue 8, 2020
|
GPUs Impact on Parallel Shared Memory Systems Performance
|
2020
|
International Journal of Advanced Science and Technology, Vol.
29, No. 5, (2020)
|
Secure Hybrid Cryptosystem Based on Playfair Cipher Using 16×16 Key Matrix and XOR Operation
|
2020
|
International
Conference on
Computer Science and Software
Engineering CSASE (2020)
|
A Secured Method of Reversible Data Hiding
|
2021
|
Qubahan Academic Journal (QAJ)
|
A Survey of Data Mining Implementation in Smart City Applications
|