A comparison study for intrusion database (KDD99, NSL-KDD) based on self organization map (SOM) artificial neural network DB Mahmood Subhy, LAHEEB M. IBRAHIM Journal of Engineering Science and Technology 8 (1), 107-119, 2013 | 178 | 2013 |
From cloud computing security towards homomorphic encryption: A comprehensive review SJ Mohammed, DB Taha TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (4 …, 2021 | 21 | 2021 |
A comparison between the performance of DWT and LWT in image watermarking DB Taha, TB Taha, NB Al Dabagh Bulletin of Electrical Engineering and Informatics 9 (3), 1005-1014, 2020 | 21 | 2020 |
Performance evaluation of RSA, ElGamal, and paillier partial homomorphic encryption algorithms SJ Mohammed, DB Taha 2022 International Conference on Computer Science and Software Engineering …, 2022 | 20 | 2022 |
A new tamper detection algorithm for video S A Hasso, T Basheer Taha Journal of Engineering Science and Technology (JESTEC) 15 (5), 3375-3387, 2020 | 8 | 2020 |
Privacy Preserving Algorithm using Chao-Scattering of Partial Homomorphic Encryption SJ Mohammed, DB Taha Journal of Physics: Conference Series 1963 (1), 012154, 2021 | 7 | 2021 |
Paillier cryptosystem enhancement for Homomorphic Encryption technique SJ Mohammed, DB Taha Multimedia Tools and Applications 83 (8), 22567-22579, 2024 | 6 | 2024 |
Digital image watermarking algorithm based on texture masking model T Basheer Taha Journal of Engineering Science and Technology 14 (6), 3347-3360, 2019 | 5 | 2019 |
Conducting multi-class security metrics from enterprise architect class diagram OS Mohammed, DB Taha International Journal of Computer Science and Information Security 14 (4), 56, 2016 | 4 | 2016 |
Handwritten text recognition using crnn AA Idris, DB Taha 2022 8th International Conference on Contemporary Information Technology and …, 2022 | 3 | 2022 |
Machine learning for software vulnerability detection: A survey SJ Ahmed, DB Taha 2022 8th International Conference on Contemporary Information Technology and …, 2022 | 3 | 2022 |
Implementation of OCR using Convolutional Neural Network (CNN): A Survey AA Alkaddo, D Albaqal Journal of Education and Science 31 (3), 27-41, 2022 | 2 | 2022 |
Measure extendibility/extensibility quality attribute using object oriented design metric TR Alreffaee, MMA Dabdawb, DB Taha TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (5 …, 2021 | 2 | 2021 |
Towards a New Metric for Watermarked Image Assessment DB Taha, TB Taha 2019 2nd International Conference on Electrical, Communication, Computer …, 2019 | 2 | 2019 |
Conducting Security Metrics for Object-oriented Class Design DB Taha, OS Mohammed International Journal of Computer Science and Information Security 15 (8), 2017 | 2 | 2017 |
Digital Image Recovery Based on Lifting Wavelet Transform TB Taha, DB Taha, R Ngadiran, P Ehkhan Journal of Physics: Conference Series 1962 (1), 012021, 2021 | 1 | 2021 |
IMAGE WATERMARKING ALGORITHM BASED ON A COMBINATION OF TEXTURE MAPPING AND BIT SUBSTITUTION METHOD DB TAHA, TB TAHA, P EHKAN Journal of Theoretical and Applied Information Technology 97 (8), 2019 | 1 | 2019 |
Webapp Effort Estimation using Cosmic Method AT Ahmed, DB Taha International Journal of Computer Applications 975, 8887, 2018 | 1 | 2018 |
The Development of the Secure Quality Dataset (SQDS): Combining Security and Quality Measures Using Deep Machine Learning for Code Smell Detection H M Yahya, D B Taha International Journal of Computing and Digital Systems 16 (1), 995-1006, 2024 | | 2024 |
Employing derivatives for creating texture masks for digital images TB Taha, R Ngadiran, DB Taha AIP Conference Proceedings 2898 (1), 2024 | | 2024 |