Protection from A Quantum Computer Cyber-Attack JE Raya, AS Yahya, EK Ahmad Technium Romanian Journal of Applied Sciences and Technology 5, 1-12, 2023 | 2* | 2023 |
Applying Software Engineering Based on Peer to Peer Communication AS Yahya Turkish Journal of Computer and Mathematics Education (TURCOMAT) 15 (1), 75-80, 2024 | 1 | 2024 |
DETECTING ANOMALIES USING UNSUPERVISED MACHINE LEARNING ALGORITHMS RJ Essa, AS YAHYA MINAR International Journal of Applied Sciences and Technology 6 (1), 219-229, 2024 | 1* | 2024 |
USING SMART CONTRACTS ON THE BLOCKCHAIN TO INCREASE WEBRTC SECURITY AS Yahya, RJ Essa MINAR International Journal of Applied Sciences and Technology 6 (3), 162- 175, 2024 | | 2024 |
Supervised Machine Learning Method for Anomaly Detection AS Yahya Basrah Journal of Science (Bas. J. Sci.) 42 (2), 262-274, 2024 | | 2024 |
Security issues on 4G and 5G networks AG Sulaiman, ZMT Alkattan, AS Yahya Seybold Report 18 (01 (2023)), 2400-2407, 2023 | | 2023 |
Encrypt Text Data Using the Linear Feedback Shift Registers Algorithm and Hide Inside an Image RJE Asma Salim Yahya Journal of Education and Science 28 (02), 316-332, 2019 | | 2019 |
Different Approaches to Handling Constraints GA for Solving Knapsack Problem AS Yahya Tikrit Journal of Pure Science 18 (2), 176-185, 2012 | | 2012 |