Follow
Hussein K. Almulla
Hussein K. Almulla
University of Anbar
Verified email at uoanbar.edu.iq
Title
Cited by
Cited by
Year
Choosing the fitness function for the job: Automated generation of test suites that detect real faults
A Salahirad, H Almulla, G Gay
Software Testing, Verification and Reliability 29 (4-5), e1701, 2019
412019
for Securing E-Mail
STF Al-Janabi, HK Abd-Alrazzaq
Digital Enterprise and Information Systems: International Conference, DEIS …, 2011
21*2011
Secure internet voting system based on public key kerberos
HK Abd-alrazzq, MS Ibrahim, OA Dawood
IJCSI Int. J. Comput. Sci, 2, 2012
132012
Learning how to search: generating effective test cases through adaptive fitness function selection
H Almulla, G Gay
Empirical Software Engineering 27 (2), 38, 2022
112022
Learning how to search: Generating exception-triggering tests through adaptive fitness function selection
H Almulla, G Gay
2020 IEEE 13th International Conference on Software Testing, Validation and …, 2020
92020
Using search-based test generation to discover real faults in Guava
H Almulla, A Salahirad, G Gay
Search Based Software Engineering: 9th International Symposium, SSBSE 2017 …, 2017
82017
Design a compact non-linear S-box with multiple-affine transformations
OA Dawood, M Khalaf, FM Mohammed, HK Almulla
International Conference on Applied Computing to Support Industry …, 2019
62019
Generating diverse test suites for Gson through adaptive fitness function selection
H Almulla, G Gay
Search-Based Software Engineering: 12th International Symposium, SSBSE 2020 …, 2020
52020
Email Security Using Two Cryptographic Hybrids of Mediated and Identity-Based Cryptography
ST Faraj, HK Abd-alrazzaq
i-Manager's Journal on Software Engineering 6 (3), 1, 2012
22012
Sleeping Encryption Unit in the Integrated Air Defence Systems
OA Dawood, H Almulla, S Khan
Advances in Military Technology 14 (2), 331-346, 2019
12019
Improvement Public Key Kerberos Using Identity-Based Signcryption
HK Abd-Alrazzaq
Proceedings of the Third International Conference on Trends in Information …, 2013
12013
Extended Sakai-Kasahara Identity-Based Encryption Scheme to Signcryption Scheme
HK Abd-Alrazzaq
IJCSIS 2012, 2012
2012
The system can't perform the operation now. Try again later.
Articles 1–12