Information technology infrastructure and small medium enterprises’ in Iraq HA Al-Lamy, MH Bakry, W Raad, SA Al-Shami, ZJ Alaraji, MW Alsa-Lihi, ... Opcion 34 (86), 1711-1724, 2018 | 33 | 2018 |
Attack graph reachability: concept, analysis, challenges and issues ZJ Al-Araji, SSS Ahmed, RS Abdullah, AA Mutlag, HAA Raheem, ... Network Security 2021 (6), 13-19, 2021 | 14 | 2021 |
Clustering Based Affinity Propagation in VANETs: Taxonomy and Opportunity of Research MS Talib, A Hassan, ZA Abas, A Abdul-hussian, MFA Hassan, ZJ AL-Araji International Journal of Recent Technology and Engineering 7 (6S5), 672-679, 2019 | 13 | 2019 |
A new fog computing resource management (FRM) model based on hybrid load balancing and scheduling for critical healthcare applications AA Mutlag, MK Abd Ghani, O Mohd, KH Abdulkareem, MA Mohammed, ... Physical Communication 59, 102109, 2023 | 10 | 2023 |
Fuzzy theory in fog computing: review, taxonomy, and open issues ZJ Al-Araji, SSS Ahmad, N Kausar, A Farhani, E Ozbilge, T Cagin IEEE Access 10, 126931-126956, 2022 | 7 | 2022 |
Attack prediction to enhance attack path discovery using improved attack graph Z Al-Araji, SS Syed Ahmad, RS Abdullah Karbala International Journal of Modern Science 8 (3), 313-329, 2022 | 7 | 2022 |
Propose vulnerability metrics to measure network secure using attack graph ZJ Al-Araji, SSS Ahmad, RS Abdullah International Journal of Advanced Computer Science and Applications 12 (5), 2021 | 7 | 2021 |
THE ROLE OF WEB DESIGN TOWARDS INFLUENCE PURCHASE INTENTION IN HOTEL INDUSTRY W Raad, N Rashid, HA ALlamy, IS Khalid, SA Al-shami, ZJ Alaraji | 6 | 2018 |
Network Traffic Classification for Attack Detection Using Big Data Tools: A Review ZJ Al-Araji, SS Syed Ahmad, MW Al-Salihi, HA Al-Lamy, M Ahmed, ... Intelligent and Interactive Computing: Proceedings of IIC 2018, 355-363, 2019 | 4 | 2019 |
Truth Discovery Using the TrustChecker Algorithm on Online Quran Tafseer ZJ Al-Araji, SS Syed Ahmad, HA Al-Lamy, MW Al-Salihi, SA Al-Shami, ... Intelligent and Interactive Computing: Proceedings of IIC 2018, 71-80, 2019 | 3 | 2019 |
Measuring the Adoption of Ubiquitous Technology Towards Online Purchase Intention in Hotel Industry H ALlamy, SA Al-Shami, N Sarli, N Rashid, N Raad, ZJ Alaraji The Turkish Online Journal of Design, Art and Communication, Special Edition …, 2018 | 2* | 2018 |
Attack graph-based security metrics: Concept, taxonomy, challenges and open issues ZJ Al-Araji, S Sakinah Syed Ahmad, HM Farhood, A Awad Mutlag, ... BIO Web of Conferences 97, 00085, 2024 | | 2024 |
Comparison Study Between Attack Graph Path Based Metrics ZJ Al-Araji, SSS Ahmad, RS Abdullah Manuscript Editor 2021, 10, 2021 | | 2021 |
The Determinants of Information Technology Towards Innovation Performance in Iraqi SMEs A Hayder, SA Al-shami, W Raad, N Rashid, Z Jasim | | 2019 |
Design of Multi-Band Matched Bandstop Filter MH Al-Taweel, BH Ahmad, MR Ahmad, TR Al-Shaikhli, MM Al-Saeedi | | 2018 |