الجامعة التكنولوجية
1. 2000-2002: (Postgraduate Master Student) Researcher In Laborites' Of Al-Rafidian College University And University Of Technology. 2. 2002-2004: (Postgraduate PhD Student) Assist-Lecture In Al-Turath College University. 3. 2004-2006: (Postgraduate PhD Student) Assist-Lecture In Al-Rafidian College University. 4. 2006-2009: (Doctor in Computer Science) Lecturer in Computer Sciences Department / University Of Technology. 5. 2009-Until Now: (Assistant Professor Doctor in Computer Science) Lecturer in Computer Sciences Department / University Of Technology.
58582946900
8
38
300
Electrical and Electronic Engineering
Safety, Risk, Reliability and Quality
Physics and Astronomy (miscellaneous)
Materials Science (all)
Signal Processing
Chemistry (all)
Computer Science (miscellaneous)
Control and Optimization
Modeling and Simulation
Computer Science Applications
Agricultural and Biological Sciences (miscellaneous)
Biotechnology
Hardware and Architecture
Mathematics (all)
Information Systems and Management
Biochemistry, Genetics and Molecular Biology (all)
Multidisciplinary
Instrumentation
Theoretical Computer Science
Control and Systems Engineering
Physics and Astronomy (all)
Information Systems
Computer Networks and Communications
Chemistry (miscellaneous)
Computer Vision and Pattern Recognition
Biomedical Engineering
Computer Science (all)
Management of Technology and Innovation
Artificial Intelligence
Human-Computer Interaction
Biochemistry, Genetics and Molecular Biology (miscellaneous)
Geology
Engineering (all)
Management Science and Operations Research
| عنوان البحث | تاريخ النشر | اسم المجلة | رابط |
|---|---|---|---|
| From static to dynamic: A new intrusion detection system for resource-constrained environments | 2026-02-27 | Aip Conference Proceedings | عرض |
| Proposal to strength image encryption using blockchain and hybrid chaotic-DNA techniques | 2025-12-01 | Egyptian Informatics Journal | عرض |
| Preserve Categorical Features Effect with Dimensionality Reduction Techniques | 2025-03-05 | Aip Conference Proceedings | عرض |
| Improving Network Intrusion Detection System by Dimensionality Reduction | 2025-03-05 | Aip Conference Proceedings | عرض |
| NSGA-II-MOGWO: A Novel Hybrid Algorithm for IoT-Fog Environment Resources Allocation | 2025-01-01 | Lecture Notes in Networks and Systems | عرض |
| Exploration Weakness and Strength of Lightweight Spongent Algorithm Using Poor and Rich Optimization Algorithm | 2025-01-01 | 3rd International Conference on Business Analytics for Technology and Security Icbats 2025 | عرض |
| Intrusion Detection System for IoT/Cloud Networks Using Federated Learning and Lightweight Cryptography | 2025-01-01 | Baghdad Science Journal | عرض |
| Proposal Medical Image Protection System Based on Hybrid CNN-Transformer Model and Chaotic Maps | 2025-01-01 | IEEE Access | عرض |
| Survey of UAV Security Authentication and Cryptography Protocols | 2024-09-01 | Iraqi Journal of Computers Communications Control and Systems Engineering | عرض |
| Combined elitism multi-objective grey wolf optimization for solving resource allocation problems | 2024-05-07 | Aip Conference Proceedings | عرض |
| A New COVID-19 Patient Detection Strategy Based on Hidden Naïve Bayes Classifier | 2024-01-01 | Iraqi Journal of Science | عرض |
| Analytical and Comparative Study for Optimization Problems | 2023-12-01 | Iraqi Journal of Computers Communications Control and Systems Engineering | عرض |
| A NOVEL APPROACH TO INTRUSION-DETECTION SYSTEM: COMBINING LSTM AND THE SNAKE ALGORITHM | 2023-12-01 | Jordanian Journal of Computers and Information Technology | عرض |
| D-GIFT: Cryptography Algorithm Development Using Dynamic DNA and A Chaos Map | 2023-03-01 | Iraqi Journal of Computers Communications Control and Systems Engineering | عرض |
| Enhancing Edge Network Security in Fog Computing: A Hybrid Authentication and Encryption Approach | 2023-01-01 | Aiccit 2023 Al Sadiq International Conference on Communication and Information Technology | عرض |
| Reducing latency in fog computing through resource allocation optimization using cuckoo search algorithm | 2023-01-01 | Aiccit 2023 Al Sadiq International Conference on Communication and Information Technology | عرض |
| Task Scheduling and Resource Allocation in Cloud Computing : A Review and Analysis | 2023-01-01 | 2023 3rd International Conference on Emerging Smart Technologies and Applications Esmarta 2023 | عرض |
| A secure communication protocol for civil drones | 2022-09-01 | Indonesian Journal of Electrical Engineering and Computer Science | عرض |
| Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems | 2022-07-01 | Symmetry | عرض |
| Intrusion Detection System Based on Ada boosting and Bagging Algorithm | 2022-06-01 | Iraqi Journal of Computers Communications Control and Systems Engineering | عرض |
| DMAV: Enhanced MAV Link Protocol Using Dynamic DNA Coding for Unmanned Aerial Vehicles | 2022-01-01 | International Journal of Online and Biomedical Engineering | عرض |
| Optimize network intrusion detection system based on PCA feature extraction and three naïve bayes classifiers | 2022-01-01 | Journal of Physics Conference Series | عرض |
| Intelligent Approaches for Enhancing Networked Routing Protocol | 2021-11-30 | Iraqi Journal of Science | عرض |
| Intrusion detection system based on bagging with support vector machine | 2021-11-01 | Indonesian Journal of Electrical Engineering and Computer Science | عرض |
| Proposed Hybrid Correlation Feature Selection Forest Panalized Attribute Approach to advance IDSs | 2021-01-01 | Karbala International Journal of Modern Science | عرض |