Announcement iconاستمرار قبول طلبات الإلتحاق !!
للفصل الدراسي الثاني من العام الأكاديمي 2019\2020

منشورات أ. د. عدوان ياسين

Article
Date Title
2019 Avoiding and Isolating Flooding Attack by Enhancing AODV MANET Protocol (AIF_AODV)
2018 Detecting and Isolating Black-Hole Attacks in MANET Using Timer Based Baited Technique
2018 Software Obfuscation Technique Based On Recurrent Neural Network
2017 Enhancing Anti-phishing by a Robust Multi-Level Authentication Technique (EARMAT)
2016 A basion MobileID-Based Authentication Technique (MBBAT)
2016 Dynamic Multi Levels Java Code Obfuscation Technique (DMLJCOT)
2016 Spam Reduction by using E-mail History and Authentication(SREHA)
2016 An intelligent classification model for phishing email detection)
2016 SQL Injection Prevention using Query Dictionary Based Mechanism
2016 A New MultiPathTCP Flooding Attacks Mitigation Technique
2016 Adaptive Weighted Clustering Algorithm for Mobile Ad-hoc Networks (AWCAMAN)
2016 Enhancing RFID Security Against Brute Force Based Attacks
2016 Enhancing Wireless Sensor Network Security Using Artificial Neural Network Based Trust Model
2015 An Enhanced Steganographic Model Based on DWT-LSB Combined with Encryption and Error Detection Techniques
2014 Enhancing the connectivity of mobile Ad-hoc networks by considering the power, mobility and activity of nodes
2012 Least Recently Plus Five Least frequently Replacement policy (LR+5LF)
2011 An Efficient Scheme For MANET Domain Formation
2010 Simple Scalar as an eLearning Mashup web application (eScalar)
2010 Low Power Architecture Cache for Embedded Systems
2010 The Preferable Bank Number for Multibanked-Caches
Conference Paper
Date Title
2017 Friendship Algorithm For Detecting Black Hole Attack In MANET
2014 Spam Filtering with verification Code
2000 Imported Computer systems and information security
1999 The Necessity of construction trusted computer system