Text Steganography Based on Font Type in Ms-Word Documents W Bhaya, AM Rahma, ALN Dhamyaa Journal of Computer Science 9 (7), 898 - 904, 2013 | 54 | 2013 |
Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach WM Abduallah, AMS Rahma, ASK Pathan Computers & Electrical Engineering, 2014 | 42 | 2014 |
Extreme learning machine based optimal embedding location finder for image steganography HA Atee, R Ahmad, NM Noor, AMS Rahma, Y Aljeroudi PloS one 12 (2), e0170329, 2017 | 33 | 2017 |
An E-Commerce Recommendation System Based on Dynamic Analysis of Customer Behavior FT Abdul Hussien, AMS Rahma, HB Abdul wahab Sustainability 13 (19), 1 - 21, 2021 | 29 | 2021 |
Recommendation Systems For E-commerce Systems An Overview FTA Hussien, AMS Rahma, HBA Wahab Journal of Physics: Conference Series 1897 (1), 012024, 2021 | 28 | 2021 |
Text Steganography Based on Unicode of Characters in Multilingual AMS Rahma, WS Bhaya, DA Al-Nasrawi International Journal of Engineering Research and Applications 3 (4), 1153 …, 2013 | 28 | 2013 |
A novel approach for the development of the Twofish algorithm based on multi-level key space SM Kareem, AMS Rahma Journal of Information Security and Applications 50, 102410, 2020 | 26 | 2020 |
Proposed New Quantum Cryptography System Using Quantum Description techniques for Generated Curves HB AbdulWahab, AMS Rahma, HMY Al-Bayatti The 2009 International conference on security and management, SAM2009, 658 - 664, 2009 | 20 | 2009 |
A secure environment using a new lightweight AES encryption algorithm for e-commerce websites FT Abdul Hussien, AMS Rahma, HB Abdul Wahab Security and Communication Networks 2021, 1-15, 2021 | 19 | 2021 |
The New Block Cipher Design (Tigris Cipher) OA Dawood, AMS Rahma, AMJ Abdul Hossen I. J. Computer Network and Information Security 2015 (12), 10-18, 2015 | 19 | 2015 |
Parallel Generation of non linear curves with computer aided application DF Almukhtar, AMS Rahma Iraqi commission for computer and information, 2003 | 17 | 2003 |
A Modification on Key Stream Generatorfor RC4 Algorithm SM Kareem, AMS Rahma Engineering and Technology Journal 38 (2 Part B), 54 - 60, 2020 | 16 | 2020 |
A Review on Steganography Techniques WM Abduallaha, AMS Rahma American Scientific Research Journal for Engineering, Technology, and …, 2016 | 16 | 2016 |
Generalized Method for Constructing Magic Cube by Folded Magic Squares OA Dawood, AMS Rahma, AMJ Abdul Hossen I.J. Intelligent Systems and Applications 2016 (1), 1 - 8, 2016 | 15 | 2016 |
Automated analysis for basketball free throw AMS Rahma, MAS Rahma, MAS Rahma 2015 IEEE Seventh International Conference on Intelligent Computing and …, 2015 | 14 | 2015 |
Design and implement a new secure prototype structure of e-commerce system FTA Hussien, AMS Rahma, HBA Wahab International Journal of Electrical and Computer Engineering 12 (1), 560-571, 2022 | 12 | 2022 |
New Symmetric Cipher Fast Algorithm of Revertible Operations' Queen (FAROQ) Cipher OA Dawood, AMS Rahma, AMJ Abdul Hossen I. J. Computer Network and Information Security 2017 (4), 29 - 36, 2017 | 12 | 2017 |
New method for improving add round key in the advanced encryption standard algorithm SM Kareem, AMS Rahma Information Security Journal: A Global Perspective 30 (6), 371-383, 2021 | 10 | 2021 |
The Euphrates Cipher OA Dawood, AM Rahma, AMJ Abdul Hossen International Journal of Computer Science Issues ( IJCSI ) 12 (2), 154 - 160, 2015 | 10 | 2015 |
Finding the Relevance Degree between an English Text and its Title AMS Rahma, SM Kadhem, AK Farhan Engineering & Technology Journal 30 (9), 1624 - 1640, 2012 | 10 | 2012 |