صورة الباحث

سكينة حسن هاشم اهدابي الغربات

الجامعة التكنولوجية

110015@uotechnology.edu.iq

1. 2000-2002: (Postgraduate Master Student) Researcher In Laborites' Of Al-Rafidian College University And University Of Technology. 2. 2002-2004: (Postgraduate PhD Student) Assist-Lecture In Al-Turath College University. 3. 2004-2006: (Postgraduate PhD Student) Assist-Lecture In Al-Rafidian College University. 4. 2006-2009: (Doctor in Computer Science) Lecturer in Computer Sciences Department / University Of Technology. 5. 2009-Until Now: (Assistant Professor Doctor in Computer Science) Lecturer in Computer Sciences Department / University Of Technology.

معرف سكوباس

58582946900

معامل هيرتش

8

عدد البحوث

38

عدد الاستشهادات

300

Electrical and Electronic Engineering

Safety, Risk, Reliability and Quality

Physics and Astronomy (miscellaneous)

Materials Science (all)

Signal Processing

Chemistry (all)

Computer Science (miscellaneous)

Control and Optimization

Modeling and Simulation

Computer Science Applications

Agricultural and Biological Sciences (miscellaneous)

Biotechnology

Hardware and Architecture

Mathematics (all)

Information Systems and Management

Biochemistry, Genetics and Molecular Biology (all)

Multidisciplinary

Instrumentation

Theoretical Computer Science

Control and Systems Engineering

Physics and Astronomy (all)

Information Systems

Computer Networks and Communications

Chemistry (miscellaneous)

Computer Vision and Pattern Recognition

Biomedical Engineering

Computer Science (all)

Management of Technology and Innovation

Artificial Intelligence

Human-Computer Interaction

Biochemistry, Genetics and Molecular Biology (miscellaneous)

Geology

Engineering (all)

Management Science and Operations Research

عنوان البحث تاريخ النشر اسم المجلة رابط
From static to dynamic: A new intrusion detection system for resource-constrained environments 2026-02-27 Aip Conference Proceedings عرض
Proposal to strength image encryption using blockchain and hybrid chaotic-DNA techniques 2025-12-01 Egyptian Informatics Journal عرض
Preserve Categorical Features Effect with Dimensionality Reduction Techniques 2025-03-05 Aip Conference Proceedings عرض
Improving Network Intrusion Detection System by Dimensionality Reduction 2025-03-05 Aip Conference Proceedings عرض
NSGA-II-MOGWO: A Novel Hybrid Algorithm for IoT-Fog Environment Resources Allocation 2025-01-01 Lecture Notes in Networks and Systems عرض
Exploration Weakness and Strength of Lightweight Spongent Algorithm Using Poor and Rich Optimization Algorithm 2025-01-01 3rd International Conference on Business Analytics for Technology and Security Icbats 2025 عرض
Intrusion Detection System for IoT/Cloud Networks Using Federated Learning and Lightweight Cryptography 2025-01-01 Baghdad Science Journal عرض
Proposal Medical Image Protection System Based on Hybrid CNN-Transformer Model and Chaotic Maps 2025-01-01 IEEE Access عرض
Survey of UAV Security Authentication and Cryptography Protocols 2024-09-01 Iraqi Journal of Computers Communications Control and Systems Engineering عرض
Combined elitism multi-objective grey wolf optimization for solving resource allocation problems 2024-05-07 Aip Conference Proceedings عرض
A New COVID-19 Patient Detection Strategy Based on Hidden Naïve Bayes Classifier 2024-01-01 Iraqi Journal of Science عرض
Analytical and Comparative Study for Optimization Problems 2023-12-01 Iraqi Journal of Computers Communications Control and Systems Engineering عرض
A NOVEL APPROACH TO INTRUSION-DETECTION SYSTEM: COMBINING LSTM AND THE SNAKE ALGORITHM 2023-12-01 Jordanian Journal of Computers and Information Technology عرض
D-GIFT: Cryptography Algorithm Development Using Dynamic DNA and A Chaos Map 2023-03-01 Iraqi Journal of Computers Communications Control and Systems Engineering عرض
Enhancing Edge Network Security in Fog Computing: A Hybrid Authentication and Encryption Approach 2023-01-01 Aiccit 2023 Al Sadiq International Conference on Communication and Information Technology عرض
Reducing latency in fog computing through resource allocation optimization using cuckoo search algorithm 2023-01-01 Aiccit 2023 Al Sadiq International Conference on Communication and Information Technology عرض
Task Scheduling and Resource Allocation in Cloud Computing : A Review and Analysis 2023-01-01 2023 3rd International Conference on Emerging Smart Technologies and Applications Esmarta 2023 عرض
A secure communication protocol for civil drones 2022-09-01 Indonesian Journal of Electrical Engineering and Computer Science عرض
Advanced Feature-Selection-Based Hybrid Ensemble Learning Algorithms for Network Intrusion Detection Systems 2022-07-01 Symmetry عرض
Intrusion Detection System Based on Ada boosting and Bagging Algorithm 2022-06-01 Iraqi Journal of Computers Communications Control and Systems Engineering عرض
DMAV: Enhanced MAV Link Protocol Using Dynamic DNA Coding for Unmanned Aerial Vehicles 2022-01-01 International Journal of Online and Biomedical Engineering عرض
Optimize network intrusion detection system based on PCA feature extraction and three naïve bayes classifiers 2022-01-01 Journal of Physics Conference Series عرض
Intelligent Approaches for Enhancing Networked Routing Protocol 2021-11-30 Iraqi Journal of Science عرض
Intrusion detection system based on bagging with support vector machine 2021-11-01 Indonesian Journal of Electrical Engineering and Computer Science عرض
Proposed Hybrid Correlation Feature Selection Forest Panalized Attribute Approach to advance IDSs 2021-01-01 Karbala International Journal of Modern Science عرض