Most Popular Papers *
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
Nuha Mohammed Khassaf and Nada Hussein M. Ali
Adversarial Attacks on Hybrid Attention Integrated Transfer Learning for Lung Cancer CT Classification
Omar Ibrahim Obaid and Abdulbasit alazawi
An optimized model for network intrusion detection in the network operating system environment
Abbas A. Abdulhameed, Sundos A. Hameed Alazawi, and Ghassan Muslim Hassan
Blockchain-Powered Dynamic Segmentation in Personal Health Record
Mishall Al-Zubaidie and Wid Alaa Jebbar
Blockchain-Integrated Edge-Cloud-Enabled Healthcare Data Analytics Based on Distributed Federated Learning and Deep Neural Networks
Mazin Abed Mohammed, Mohd Khanapi Abd Ghani, Israa Badr Al-Mashhadani, Sajida Memon, Sajida Memon, Haydar Abdulameer Marhoon, and Marwan Ali Albahar
A Classifier-Driven Deep Learning Clustering Approach to Enhance Data Collection in MANETs
Ali Abdullah Ali, Mohammed Khaleel Hussein, and Mohammed Ahmed Subhi
A Comprehensive Review of Security Measures in Database Systems: Assessing Authentication, Access Control, and Beyond
Habeeb Omotunde and Maryam Ahmed
Advanced cyber security using Spectral entity feature selection based on Cyber Crypto Proof Security Protocol (C2PSP)
GOPALAKRISHNAN S, Karabi Saikia, and Ranadheer Reddy Vallem
A Dynamic DNA Cryptosystem for Secure File Sharing
Kanaan J. Brakas and Mafaz Alanezi
AI-Powered Cyber Threats: A Systematic Review
Mafaz Alanezi and Ruah Mouad Alyas AL-Azzawi
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 02/25/26.