Color image encryption using chaotic maps, triangular scrambling, with DNA sequences HM Al-Mashhadi, IQ Abduljaleel 2017 International Conference on Current Research in Computer Science and …, 2017 | 32 | 2017 |
A survey of email service; attacks, security methods and protocols HM Al-Mashhadi, MH Alabiech International Journal of Computer Applications 162 (11), 2017 | 13 | 2017 |
HYBRID HOMOMORPHIC CRYPTOSYSTEM FOR SECURE TRANSFER OF COLOR IMAGE ON PUBLIC CLOUD ALAAAK HAIDER M. AL-MASHHADI Journal of Theoretical and Applied Information Technology 96 (19), 6474-6486, 2018 | 12* | 2018 |
Secure and time efficient hash-based message authentication algorithm for wireless sensor networks HM Al-Mashhadi, HB Abdul-Wahab, RF Hassan 2014 Global Summit on Computer & Information Technology (GSCIT), 1-7, 2014 | 12 | 2014 |
The quality of image encryption techniques by reasoned logic MK Hussein, KR Hassan, HM Al-Mashhadi TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (6 …, 2020 | 11 | 2020 |
Data security protocol for wireless sensor network using chaotic map HM Al-Mashhadi, HB Abdul-Wahab, RF Hassan International Journal of Computer Science and Information Security 13 (8), 80, 2015 | 8 | 2015 |
Improving blockchain consensus mechanism via network clusters AJ Al-Musharaf, SM Al-Alak, HM Al-Mashhadi 2021 1st Babylon International Conference on Information Technology and …, 2021 | 6 | 2021 |
QR code based two-factor authentication to verify paper-based documents MAU Naser, ET Jasim, HM Al-Mashhadi TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (4 …, 2020 | 6 | 2020 |
IoT Based Multitasking Games and Entertainment Arcade Station using Raspberry-Pi HMJ Iman Mohsin Hassan, Haider M. Al-Mashhadi, Kareem Radhi Hassan JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY 54 (3), 7, 2019 | 6 | 2019 |
Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review AD Khaleefah, HM Al-Mashhadi Iraqi Journal of Science, 2024 | 5 | 2024 |
Quality Assessment for Image Encryption Techniques using Fuzzy Logic System HM Al-Mashhadi International Journal of Computer Applications 157 (5), 22-26, 2017 | 4 | 2017 |
Chaotic Encryption Scheme for Wireless Sensor Network’s Message HM Al-Mashhadi, HB AbdulWahab, RF Hassan Proc World Symp Comput Netw Inf Sec, 116-120, 2014 | 3 | 2014 |
Detection of iot botnet cyber attacks using machine learning AD Khaleefah, HM Al-Mashhadi Informatica 47 (6), 2023 | 2 | 2023 |
Symmetric ECC with Variable Key using Chaotic Map HM Al-Mashhadi, MH Alabiech International Journal of Computer Science Issues (IJCSI) 14 (6), 24-28, 2017 | 2 | 2017 |
Enforcement of Color Image Copyright Using the Frequency Domain MK Haider M. Al-Mashhadi, Zainab Dahoos Journal Basrah Researches ((Sciences)) 35 (1), 17-25, 2009 | 2* | 2009 |
Big data aggregation, visualization and clustering for Smart Grid in Smart City using machine learning HM Al-Mashhadi, HJ Fahad IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING …, 2023 | 1 | 2023 |
Design and Implementation of a Smart Integrated Framework to Monitor and Control the Smart City using the Internet of Things HM Al-Mashhadi, KR Hassan Journal of Southwest Jiaotong University 54 (6), 2019 | 1 | 2019 |
Design and Implementation IOT2ALK cloud Computing Platform for IOT Applications ZK Mohsin, HM Al-Mashhadi, MN Tahan BIO Web of Conferences 97, 00046, 2024 | | 2024 |
Enhanced Security of Iraqi National Card Based on Blockchain Technique MM Ashor, HM Al-Mashhadi Iraqi Journal of Intelligent Computing and Informatics (IJICI) 2 (2), 58-67, 2023 | | 2023 |
Design AI platform using fuzzy logic technique to diagnose kidney diseases HM Al-Mashhadi, AL Khudhair TELKOMNIKA (Telecommunication Computing Electronics and Control) 21 (2), 324-332, 2023 | | 2023 |