Most Recent Additions*
Optimized Wavelet Scatter Method for Accurate Classification and Segmentation of Lung Nodules
Enas Hamood Al-Saadi, Ahmed Nidhal Khdiar, and Nidhal K. El Abbadi
Navigating the Void: Uncovering Research Gaps in the Detection of Data Poisoning Attacks in Federated Learning-Based Big Data Processing: A Systematic Literature Review
Mohammad Aljanabi and Hijaz Ahmad
Mapping the Evolution of Intrusion Detection in Big Data: A Bibliometric Analysis
Mohanad G. Yaseen and A. S. Albahri
Climate Changes through Data Science: Understanding and Mitigating Environmental Crisis
Ahmed Hussein Ali and Rahul Thakkar
A Proposed Algorithm For Avoiding Jammer In Structure-Free Wireless Sensor Networks
Zainab Shaker Matar Al-Husseini, Hussain K. Chaiel, Amel Meddeb, Ahmed Fakhfakh, and Ahmed Fakhfakh
Mitigating Zero-Day Vulnerabilities in IIoT Systems: Challenges and Advances in AI-Powered Intrusion Detection Systems
Khalid Asaad Hashim, Yusnani Binti Mohd Yussoff, and Shahrani Binti - Binti Shahbudin
Global Research Trends and Collaboration in MITRE ATT&CK Framework: A Bibliometric and Network Analysis in Cybersecurity
Asad Maqsood, Syifak Izhar Hisham, and Ahmad Firdaus
Improvement of the Face Recognition Systems Security Against Morph Attacks using the Developed Siamese Neural Network
Sura Abed Sarab Hussien, Thair Abed Sarab Hussien, and Nada Hussein M. Ali
A New Framework Enhancing, Evaluation, and Benchmarking for Cybersecurity DDoS Attack Detection Models Through the Integration of BWM and VIKOR Methods
Alaa Mohammed Mahmood, İsa AVCI, and Sahar Yousif Mohammed
Blockchain-Integrated Edge-Cloud-Enabled Healthcare Data Analytics Based on Distributed Federated Learning and Deep Neural Networks
Mazin Abed Mohammed, Mohd Khanapi Abd Ghani, Israa Badr Al-Mashhadani, Sajida Memon, Sajida Memon, Haydar Abdulameer Marhoon, and Marwan Ali Albahar
Blockchain-Based Accountability: A Systematic Literature Review
Nabeel Z. Tawfeeq and Dujan B. Taha
PRIFLEX: A Secure Federated Learning Framework for Evaluating Privacy Leakage and Defense in Cross-Modal Medical Data
Mohammad Othman Nassar and Feras Fares AL-Mashagba
Comprehensive study of Integrating Clustering and Adversarial Learning for Enhanced Recommender Systems: A Systematic Review of Hybrid Methodologies and Applications
M. E. Alqaysi, Murtadha M. Hamad, and Ahmed Subhi Abdalkafor
Enhancing Internet of Things (IoT) Network Security: A Machine Learning-Driven Framework for Real-Time Intrusion Detection and Anomaly Classification
Loiy Alsbatin, Firas Zawaideh, Basem Mohamad Alrifai, Tareq A. Alawneh, and Tareq A. Alawneh
Blockchain-Powered Dynamic Segmentation in Personal Health Record
Mishall Al-Zubaidie and Wid Alaa Jebbar
Enhanced Key Generation Method using Deep Q-Networks Algorithm with Chaotic Maps
Ali A. Mahdi and Mays M. Hoobi
Multilevel Text Protection System Using AES and DWT-DCT-SVD Techniques
Nuha Mohammed Khassaf and Nada Hussein M. Ali
Enhancing Multifactor Authentication Using Machine Learning Techniques
Rafea Mohammed Ibrahim
Optimizing Cybersecurity in 5G-Enabled IoT Networks via a Resource-Efficient Random Forest Model
Zainab Ali Abbood, Aysar Hadi Oleiwi, Raghad Tariq Al-Hassani, Jenan Ayad, and Jenan Ayad
*Updated as of 02/27/26.