Developing an end-to-end secure chat application N Sabah, JM Kadhim, BN Dhannoon Int. J. Comput. Sci. Netw. Secur 17 (11), 108-113, 2017 | 9 | 2017 |
Text-based steganography using Huffman compression and AES encryption algorithm RH Ali, JM Kadhim Iraqi Journal of Science, 4110-4120, 2021 | 8 | 2021 |
Steganography using TCP/IP’s sequence number JM Kadhim, AE Abed Al-Nahrain Journal of Science 20 (4), 102-108, 2017 | 8 | 2017 |
Touchscreen-based Smartphone Continuous Authentication System (SCAS) using Deep Neural Network ASM Al-Dori, JM Kadhim Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (11 …, 2021 | 2 | 2021 |
Watermark Authentication for Secure Data Aggregation in WSN Based on Secure Hash Algorithm and Node Identifier JM Kadhim, EF Yahya International Research Journal of Advanced Engineering and Science 4 (4), 80-85, 2019 | 2 | 2019 |
Security of wireless sensor nodes JM Kadhim Iraqi Journal of Science, 1773-1780, 2020 | 1 | 2020 |
Authenticated Node and Replicated Node in Wireless Sensor Networks Based on Location and Distance Information JM Kadhim, EF Yahya International Research Journal of Advanced Engineering and Science 4 (4 …, 2019 | 1* | 2019 |
Text Hiding Using Text-Based Captcha Cover Image With Random Method DJMK Zainab Nadhim Adnan Computer Integrated Manufacturing Systems 29 (7), 119-129, 2023 | | 2023 |