Entropy analysis and image encryption application based on a new chaotic system crossing a cylinder AK Farhan, NMG Al-Saidi, AT Maolood, F Nazarimehr, I Hussain Entropy 21 (10), 958, 2019 | 62 | 2019 |
Performance analysis of flow-based attacks detection on CSE-CIC-IDS2018 dataset using deep learning RI Farhan, AT Maolood, NF Hassan Indones. J. Electr. Eng. Comput. Sci 20 (3), 1413-1418, 2020 | 42 | 2020 |
Hybrid feature selection approach to improve the deep neural network on new flow-based dataset for NIDS RI Farhan, AT Maolood, NF Hassan Wasit Journal of Computer and Mathematics Science, 49-61, 2021 | 18 | 2021 |
Optimized deep learning with binary PSO for intrusion detection on CSE-CIC-IDS2018 dataset RI Farhan, AT Maolood, NF Hassan Journal of Al-Qadisiyah for computer science and mathematics 12 (3), Page 16-27, 2020 | 18 | 2020 |
Novel lightweight video encryption method based on ChaCha20 stream cipher and hybrid chaotic map. AT Maolood, EK Gbashi, ES Mahmood International Journal of Electrical & Computer Engineering (2088-8708) 12 (5), 2022 | 11 | 2022 |
Lightweight Authentication Model for IoT Environments Based on Enhanced Elliptic Curve Digital Signature and Shamir Secret Share. MS Oudah, AT Maolood International Journal of Intelligent Engineering & Systems 15 (5), 2022 | 8 | 2022 |
PROPOSAL TO ENHANCE FINGERPRINT RECOGNITION SYSTEM AAM soukaena H. Hashim , Abeer T. Maolood IJCET 4 (3), 13, 2013 | 8* | 2013 |
WITHDRAWN: Developing modern system in healthcare to detect COVID 19 based on Internet of Things MH Ismael, AT Maolood Materials Today: Proceedings, 2021 | 7 | 2021 |
An effective preprocessing step algorithm in text mining application RM Hadi, SH Hashem, AT Maolood Engineering and Technology Journal 35 (2 Part), 2017 | 7 | 2017 |
Developed Lightweight Cryptographic Algorithms for The Application of Image Encryption: A Review AN Mazher, J Waleed, AT MaoLood Journal of Al-Qadisiyah for computer science and mathematics 13 (2), Page 11 …, 2021 | 6 | 2021 |
A novel serpent algorithm improvement by the key schedule increase security HR Zagi, AT Maolood Tikrit Journal of Pure Science 25 (6), 114-125, 2020 | 6 | 2020 |
Fast Novel Efficient S‐Boxes with Expanded DNA Codes AT Maolood, AK Farhan, WI El-Sobky, HN Zaky, HL Zayed, HE Ahmed, ... Security and Communication Networks 2023 (1), 5767102, 2023 | 4 | 2023 |
The Security Threats and Solutions of Network Functions Virtualization: A Review AN Mazher, J Waleed, AT MaoLood Journal of Al-Qadisiyah for computer science and mathematics 12 (4), Page 38 …, 2020 | 4 | 2020 |
Machine Learning-Based Detection of Credit Card Fraud: A Comparative Study ZK Alkhateeb, AT Maolood American Journal of Engineering and Applied Sciences 12 (4), 535-542, 2019 | 3 | 2019 |
New Pseudo-Random Key Generator for IoT-security Model Based on a Novel 3D Coupled Map Lattice. MS Oudah, AT Maolood International Journal of Intelligent Engineering & Systems 15 (5), 2022 | 2 | 2022 |
A New Key Generation to Greate Enhanced Security Version of AES Encryption Method HR Zagi, AT Maolood Journal of College of Education, 2021 | 2 | 2021 |
Banking Intrusion Detection Systems based on customers behavior using Machine Learning algorithms: Comprehensive study WS Mahdi, AT Maolood Journal of Al-Qadisiyah for computer science and mathematics 12 (4), Page 1 …, 2020 | 2 | 2020 |
Using rhabditis blumi sudhaus as biological agents to control the palp borer, Arabian rhinoceros beetle, Oryctes agamemnon arabicus AM Tariq Iraqi Journal of Agricultural Sciences 51 (2), 657-664, 2020 | 2 | 2020 |
Towards Generating Robust Key Based on Neural Networks and Chaos Theory ALT Dr. Abeer Tariq Maolood Iraqi Journal of Science 59, 1518-1530, 2018 | 2 | 2018 |
SMSCC: Smarter and More Secure Credit Card Using Neural Networks in Zero Knowledge Protocol AT Maolood Al-Rafidain University College For Sciences, 227-243, 2014 | 2* | 2014 |