1.

A Comparative Study on Security Features in MANETs Routing Protocols

Volume 15, Issue 3, December 2015, Pages 25-37
Dr. Israa Tahseen Al-attar

2.

A NEW ALGORITHM FOR ENCRYPTING ARABIC TEXT USING THE MATHEMATICAL EQUATION

Volume 10, Issue 1, March 2017, Pages 21-30
Saad Abdulazeez Shaban; Basim Najim al-din

3.

Application of Chaotic Neural Network for Authentication using the Database

Volume 11, Issue 1, June 2014, Pages 81-95
Ammar Thaher Yaseen Abd Alazeez

4.

A Secure Index for Document Similarity Detection

Volume 7, Issue 4, December 2011, Pages 51-62
Ayad Ibrahim Abdulsada

5.

A Survey on Security Challenges in Wireless Sensor Networks

Volume 12, Issue 3, September 2017, Pages 42-71
Rana Hameed Hussain

6.

Challenges of the Security Function of State under the Contemporary Political Changes (Iraq Model

Volume 0, Issue 70, November 2018, Pages 111-141
Ammar Saadoon Albadry; omar jumaah Imran

7.

Design and Implementation Multi Level Security System

Volume 24, Issue 9, December 2016, Pages 2383-2388
Saba Mohammed Husain

8.

Design And Implementation Of A Transparent Secure Lan

Volume 12, Issue 4, December 2006, Pages 1063-1076
Firas R. Barjas; Sufyan T. Faraj

9.

Design and Implementation of Distributed Real-time Security System via Mobile Technology

Volume 10, Issue 2, June 2013, Pages 79-99
Dhuha Basheer Abdullah; Wael W. Mahmood

10.

Digital Image Encryption by Random Pixel Selecting Using Chaotic Sequences

Volume 0, Issue 26, September 2018, Pages 228-236
Hikmat N. Abdullah; Hadi. T. Zeboon; Atheer J. Mansor

11.

Enhanced the Security of Electronic-Commerce (E-Commerce)

Volume 24, Issue 5, June 2016, Pages 1173-1180
Noura H.Ajam

12.

Implementation of A security Service Provider for Intranets

Volume 14, Issue 2, June 2008, Pages 2416-2428
Wameedh N. Flayih; Hamid M. Ali

13.

Mexican Hat Net used to increase the security of encoded text

Volume 23, Issue 1, March 2010, Pages 137-151
Maha AbdulIlah Al-Badrani

14.

New Encrypted Steganography Approach

Volume 26, Issue 2, June 2018, Pages 36-46
Saba Mohammed Husain

15.

Steganography Technique using Genetic Algorithm

Volume 59, Issue 3, December 2018, Pages 1312-1325
Rawaa Dawoud AL-Dabbagh; Nada A.Z. Abdullah; Reyam Jassim Essa

16.

the American strategy and its impact on the social and security situation in Iraq

Volume 0, Issue 36, February 2018, Pages 139-154
Heifaa Ahmed Mohamed

17.

The obstetrical of democracy transformation in Iraq

Volume 0, Issue 27, January 2018, Pages 127-140
Taha Al- Anbagy

18.

User Centric Android Application Permission Manager

Volume 15, Issue 2, December 2021, Pages 213-223
Belal Mohammed Amro; Zaid Abu Znaid

19.

Use the Genetic Algorithm to Encode and Hide Gray Image Data

Volume 10, Issue 1, March 2013, Pages 169-182
Raya Jassim Essa; Reham Jassim Essa; Inam Muhammad Sulaiman

20.

WLAN Integrated with GPRS Network Securely

Volume 8, Issue 1, March 2012, Pages 1-10
Mohammed A. Abdalla; Khalifa A. Salim; Zinah Jaafar Mohammed

21.

أمن المجتمعات فی الدراسات الامنیة الحدیثة: نینوى انموذجاً

Volume 14, Issue 57, February 2021, Pages 83-102
محمد سالم السامرائی; مها احمد ابراهیم

22.

الخطورة الأمنية للجرائم الالكترونية وسبل مكافحتها

Volume 4, Issue 7, January 2009, Pages 173-180
القاضي فاضل عباس الملا

23.

العلاقة بين البيئة والأمن والتنمية

Volume 5, Issue 12, February 2010, Pages 9-37
أ.د. حيدر عبد الرزاق كمونة; أ.م.د. عبد الصاحب ناجي البغدادي

24.

ملامح من الحیاة الاجتماعیة فی المدینة فی عهد الرسول صلى الله علیه وسلم

Volume 31, Issue 34, June 2001, Pages 212-232
ریاض هاشم النعیمی



Journal Management System. Powered by ejournalplus.com