Loading...
The system can't perform the operation now. Try again later.
Citations per year
Duplicate citations
The following articles are merged in Scholar. Their
combined citations
are counted only for the first article.
Merged citations
This "Cited by" count includes citations to the following articles in Scholar. The ones marked
*
may be different from the article in the profile.
Add co-authors
Co-authors
Follow
New articles by this author
New citations to this author
New articles related to this author's research
Email address for updates
Done
My profile
My library
Metrics
Alerts
Settings
Sign in
Sign in
Get my own profile
Cited by
All
Since 2019
Citations
4
4
h-index
1
1
i10-index
0
0
0
2
1
2020
2021
2022
2023
1
1
2
Co-authors
Furkan Rabee
Dr. Computer Science and engineering , Kufa University
Verified email at uokufa.edu.iq
Mohammed Nsaif
lecturer, University of Kufa
Verified email at uokufa.edu.iq
Follow
Abbas Fadhil Mahdi
lecturer
Verified email at uokufa.edu.iq -
Homepage
internet of things
image processing
cryptography
computer science
Articles
Cited by
Co-authors
Title
Sort
Sort by citations
Sort by year
Sort by title
Cited by
Cited by
Year
Detection and prevention algorithm of ddos attack over the IOT Networks
MR Nsaif, MF Abbood, AF Mahdi
TEM Journal 9 (3), 899
, 2020
3
2020
Shift-Exchange Synchronization Protocol (SESP) in Hard Real Time System
F Rabee, A Onaizah, AF Mahdi
IEEE Xplore
, 2017
1
2017
A Blockchain Mining Proof of Work Approach Based on Fog Computing Virtualization for Mobile CrowdSensing
AF Mahdi, F Rabee
2024 Third International Conference on Distributed Computing and High …
, 2024
2024
Modified Mathematical Method to Improve RSA Image Cryptosystem Algorithm
SATMRN Abbas Fadhil Mahdi
Journal of Engineering and Applied Sciences 14 (2), 464-469
, 2019
2019
Applying Simplex Method in a New Way (Addition and Multiplication) on Triangular Fuzzy Number to Find the Optimal Solution
SAAAFM Mohanad R. AL-Janabi
Journal of Engineering and Applied Sciences 14 (2), 470-475
, 2019
2019
A Survey on Distributed, Concurrent, and Independent to Access Encrypted Cloud Databases
AF MAHDI, TR NAIK
2015
The system can't perform the operation now. Try again later.
Articles 1–6
Show more
Privacy
Terms
Help
About Scholar
Search help