1. | A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function | |
Volume 29, Issue 16, December 2011, Pages 3291-3301 | ||
Muna Mohammed Al-Nayar | ||
2. | Development an Anomaly Network Intrusion Detection System Using Neural Network | |
Volume 18, Issue 12, December 2012, Pages 1325-1334 | ||
Elaf Sabah Abbas; Hamid M. Ali; Kais Said Al-Sabbagh | ||
3. | Secure Watermark Image Steganography by Pixel Indicator Based on Randomization | |
Volume 4, Issue 2, December 2012, Pages 101-110 | ||
M. Hamid Mohammed Farhan; Zena Ahmed | ||