الجامعة التكنولوجية
Dr.Ekhlas Khalaf Gbashi earned her Ph.D. in networks security from the Department of computer sciences at the Technology University. Ekhlas earned her bachelor’s and master’s degree in computer sciences from the University of Technology (UOT), Baghdad, Iraq in 1998, 2005. Ekhlas is a faculty member in the computer sciences Department at the University of Technology (UOT) since 2000; where she became Head of registration unit in computer sciences department at 2010 and a Head of computer security Branch at the UOT from 2016 until 2020. Her research interested focus on in networks security (intrusion detection system), data security, computer networks, Educational Assessment, Comparative Education and Computer Architecture, image processing,AI
57189065185
5
20
114
Horticulture
Artificial Intelligence
Mathematics (all)
Computer Science (all)
Materials Science (miscellaneous)
Agricultural and Biological Sciences (miscellaneous)
Computer Vision and Pattern Recognition
Electrical and Electronic Engineering
Chemistry (miscellaneous)
Information Systems
Computer Networks and Communications
Physics and Astronomy (all)
Mechanics of Materials
Information Systems and Management
Biochemistry, Genetics and Molecular Biology (all)
Statistics and Probability
Biomaterials
Agronomy and Crop Science
Biotechnology
Hardware and Architecture
Modeling and Simulation
Computer Science (miscellaneous)
Control and Optimization
Signal Processing
Materials Science (all)
Computer Science Applications
Plant Science
Physics and Astronomy (miscellaneous)
Chemistry (all)
Control and Systems Engineering
Engineering (all)
Geology
| عنوان البحث | تاريخ النشر | اسم المجلة | رابط |
|---|---|---|---|
| Color Image Encryption Based on a New Symmetric Lightweight Algorithm | 2025-05-07 | Mesopotamian Journal of Cybersecurity | عرض |
| Preserve Categorical Features Effect with Dimensionality Reduction Techniques | 2025-03-05 | Aip Conference Proceedings | عرض |
| Enhancement of E-Voting Security System Based on Post-Quantum Cryptography | 2025-01-01 | Lecture Notes in Networks and Systems | عرض |
| Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model | 2024-09-01 | Telecom | عرض |
| Symmetry Analysis in Construction Two Dynamic Lightweight S-Boxes Based on the 2D Tinkerbell Map and the 2D Duffing Map | 2024-07-01 | Symmetry | عرض |
| A review of Chaotic Maps used for Generating Secure Random Keys | 2024-04-05 | Bio Web of Conferences | عرض |
| New S-Box Generation Based on Hybrid Two-Dimensional Chaotic Map for Color Image Encryption | 2024-01-01 | International Journal of Intelligent Engineering and Systems | عرض |
| A Systematic Review: Post Quantum Cryptography to Secure Data Transmission | 2024-01-01 | Iraqi Journal of Science | عرض |
| A Lightweight Image Encryption Algorithm Based on Secure Key Generation | 2024-01-01 | IEEE Access | عرض |
| Privacy Security System for Video Data Transmission in Edge-Fog-cloud Environment | 2023-01-01 | International Journal of Intelligent Engineering and Systems | عرض |
| NTRU_ SSS: Anew Method Signcryption Post Quantum Cryptography Based on Shamir’s Secret Sharing | 2023-01-01 | Computers Materials and Continua | عرض |
| Novel Dynamic S-Box Based on Password Key and Circle Map | 2023-01-01 | Iraqi Journal of Science | عرض |
| Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map | 2022-10-01 | International Journal of Electrical and Computer Engineering | عرض |
| A secure communication protocol for civil drones | 2022-09-01 | Indonesian Journal of Electrical Engineering and Computer Science | عرض |
| A Lightweight Hash Function Based on Enhanced Chaotic Map Algorithm(Keccak) | 2022-06-01 | Iraqi Journal of Computers Communications Control and Systems Engineering | عرض |
| A Novel Chaotic map to improve security Image Based on Mandelbrot Fractals | 2022-01-01 | 2022 International Conference on Data Science and Intelligent Computing Icdsic 2022 | عرض |
| E-Voting System using Solana Blockchain | 2022-01-01 | 4th International Conference on Current Research in Engineering and Science Applications Iccresa 2022 | عرض |
| Scale-invariant feature transform algorithm with fast approximate nearest neighbor | 2017-01-01 | Baghdad Science Journal | عرض |
| Important parameters analysis of the single-walled carbon nanotubes composite materials | 2016-04-20 | Arpn Journal of Engineering and Applied Sciences | غير متوفر |
| Proposed vision for network intrusion detection system using latent semantic analysis and data mining | 2014-11-14 | 2014 6th Computer Science and Electronic Engineering Conference Ceec 2014 Conference Proceedings | عرض |