Follow
Wafaa Mustafa Abduallah
Wafaa Mustafa Abduallah
Lecturer of Computer Science, Duhok Polytechnic University, Kurdistan Region - Iraq
Verified email at dpu.edu.krd
Title
Cited by
Cited by
Year
Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods
BA Khalaf, SA Mostafa, A Mustapha, MA Mohammed, WM Abduallah
IEEE Access, 2019
922019
Modelling an adjustable autonomous multi-agent internet of things system for elderly smart home
SA Mostafa, SS Gunasekaran, A Mustapha, MA Mohammed, ...
International conference on applied human factors and ergonomics, 301-311, 2019
452019
IDPS: an integrated intrusion handling model for cloud
HM Alsafi, WM Abduallah, ASK Pathan
arXiv preprint arXiv:1203.3323, 2012
442012
Acute lymphoblastic leukemia segmentation using local pixel information
SS Al-jaboriy, NNA Sjarif, S Chuprat, WM Abduallah
Pattern Recognition Letters 125, 85-90, 2019
422019
Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach
WM Abduallah, AMS Rahma, ASK Pathan
Computers & Electrical Engineering 40 (4), 1390-1404, 2014
392014
A review on recent steganography techniques in cloud computing
OM Ahmed, WM Abduallah
Academic Journal of Nawroz University 6 (3), 106-111, 2017
242017
Stego-Based-Crypto Technique for High Security Applications
AMA Brifcani, WMA Brifcani
International Association of Computer Science and Information Technology …, 2010
232010
Real time implementation of stegofirewall system
MR Al-Sultan, SY Ameen, WM Abduallah
International Journal of Computing and Digital Systems 8 (5), 498-504, 2019
142019
New Data hiding method based on DNA and Vigenere Autokey
WM Abduallah, SRM Zeebaree
Academic Journal of Nawroz University 6 (3), 83-88, 2017
142017
GPUs Impact on Parallel Shared Memory Systems Performance
OMA LAILAN M. HAJI, RIZGAR R. ZEBARI , SUBHI R.M. ZEEBAREE, WAFAA MUSTAFA ...
International Journal of Psychosocial Rehabilitation 24 (8), 8030-8038, 2020
11*2020
A review on steganography techniques
WM Abduallah, AMS Rahma
American Academic Scientific Research Journal for Engineering, Technology …, 2016
82016
A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks
ASK Pathan, WM Abduallah, S Khanam, HY Saleem
Simulation 89 (5), 616-634, 2013
52013
An efficient ElGamal cryptosystem scheme
HI Hussein, WM Abduallah
International Journal of Computers and Applications 43 (10), 1088-1094, 2021
42021
A modified table lookup substitution method for hiding data in DNA
HI Hussein, WM Abduallah
2018 International Conference on Advanced Science and Engineering (ICOASE …, 2018
42018
Reversible data hiding scheme based on 3-least significant bits and mix column transform
WM Abduallah, AMS Rahma, ASK Pathan
International Conference on Security and Privacy in Communication Systems …, 2013
42013
A new data hiding technique based on irreducible polynomials
WM Abduallah, AMS Rahma, ASK Pathan
Journal of Emerging Technologies in Web Intelligence 5 (1), 2013
32013
Tackling Intruders in Wireless Mesh Networks
ASK Pathan, S Khanam, HY Saleem, WM Abduallah
Distributed Network Intelligence, Security and Applications. CRC Press …, 2013
22013
A Review of Intrusion Detection Systems
HK Shaikha, WM Abduallah
Academic Journal of Nawroz University 6 (3), 101-105, 2017
12017
A Smart Home Design Based on Ethernet
WM Abduallah, RZ Mahmood, DM Abdullah
Academic Journal of Nawroz University 6 (3), 59-63, 2017
12017
A Secured Method of Reversible Data Hiding
YA Hamza, WM Abduallah
2020 International Conference on Computer Science and Software Engineering …, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–20