|
thomson |
2022-05 |
TEM Journal |
أ.م . رواء محمد عبد الحسين |
Detecting Phishing Cyber Attack Based on Fuzzy Rules and Differential Evaluation |
1 |
|
scopus |
2022-02 |
TELKOMNIKA Telecommunication Computing Electronics and Control |
أ.م . رواء محمد عبد الحسين |
Optimized load balance scheduling algorithm |
2 |
|
scopus |
2022-08 |
TELKOMNIKA (Telecommunication Computing Electronics and Control) |
أ.م . رواء محمد عبد الحسين |
A security services for internet of thing smart health care solutions based blockchain technology |
3 |
|
local |
2017-09-25 |
Journal of College of Education |
أ.م . رواء محمد عبد الحسين |
Cloud Based Iraqi E-government |
4 |
|
science |
2016-12-01 |
Iraqi Journal of Information Technology |
أ.م . رواء محمد عبد الحسين |
Assessment of Web Scanner Tools |
5 |
|
local |
2017-01-31 |
Iraqi Journal of Information Technology |
أ.م . رواء محمد عبد الحسين |
Authenticated Transmission of Client Server Network |
6 |
|
local |
2015-03-16 |
Iraqi Journal of Information Technology |
أ.م . رواء محمد عبد الحسين |
Protecting Website from Cross Site Script Attack |
7 |
|
local |
2011-04-25 |
College of Education |
أ.م . رواء محمد عبد الحسين |
Encryption and Authentication of Instant Message |
8 |