العنوان : استاذ
الكلية : الحاسوب وتكنولوجيا المعلومات
القسم : الأمن السيبراني
البريد الالكتروني : haider.abdulnabi@uobasrah.edu.iq
رابط Google Scholar: | https://scholar.google.com/citations?user=yGFexTUAAAAJ&hl=ar |
---|---|
رابط Research Gate : | https://www.researchgate.net/profile/Haider_Al-Mashhadi2?ev=hdr_xprf&_sg=xXs2O6tmF7N3XYO3us_oo7ZTFI7... |
رابط Web of Science : | https://publons.com/researcher/2564181/haider-m-al-mashhadi/ |
رابط Scopus : | https://www2.scopus.com/authid/detail.uri?authorId=56644928500 |
رابط ORCID : | https://orcid.org/0000-0002-0804-1945 |
عنوان البحث | النوع | الناشر | السنة | عالمي | مفرد | ثومبسون رويتر (كلارفيت) |
سكوبس | تحميل |
---|---|---|---|---|---|---|---|---|
Design and Implementation of the Marsh Climate Monitoring System Using the Internet of Things | بحث مجلة | Iraqi Journal for Electrical and Electronic Engineering | 2025 | ![]() |
![]() |
|||
Enhancing Security of Smart Energy Meter Data Using Blockchain Technology | بحث مجلة | Letters in High Energy Physics | 2025 | ![]() |
![]() |
|||
Methodologies, Requirements, and Challenges of Cybersecurity Frameworks: A Review | بحث مجلة | Iraqi Journal of Science | 2024 | ![]() |
![]() |
|||
DESIGN AND IMPLEMENTATION IOT2ALK CLOUD COMPUTING PLATFORM FOR IOT APPLICATIONS | بحث مؤتمر | BIO Web of Conferences ISCKU 2024 | 2024 | ![]() |
![]() |
|||
Detection of IoT Botnet Cyber Attacks Using Machine Learning | بحث مجلة | Informatica | 2023 | ![]() |
![]() |
|||
Enhanced Security of Iraqi National Card Based on Blockchain Technique | بحث مجلة | Iraqi Journal of Intelligent Computing and Informatics (IJICI) | 2023 |
![]() |
||||
Big Data Aggregation, Visualization and Clustering for Smart Grid in Smart City using Machine Learning | بحث مجلة | Iraqi Journal of Computers, Communications, Control & Systems Engineering (IJCCCE) | 2023 |
![]() |
||||
QR code based two-factor authentication to verify paper-based documents | بحث مجلة | TELKOMNIKA Telecommunication, Computing, Electronics and Control | 2020 | ![]() |
![]() |
![]() |
||
The quality of image encryption techniques by reasoned logic | بحث مجلة | TELKOMNIKA Telecommunication, Computing, Electronics and Control | 2020 | ![]() |
![]() |
![]() |
||
IoT Based Multitasking Games and Entertainment Arcade Station using Raspberry-Pi | بحث مجلة | JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY | 2019 | ![]() |
![]() |
![]() |
||
HYBRID HOMOMORPHIC CRYPTOSYSTEM FOR SECURE TRANSFER OF COLOR IMAGE ON PUBLIC CLOUD | بحث مجلة | Journal of Theoretical and Applied Information Technology | 2018 | ![]() |
![]() |
![]() |
||
Color Image Encryption using Chaotic Maps, Triangular Scrambling, with DNA Sequences | بحث مؤتمر | 2017 International Conference on Current Research in Computer Science and Information Technology (ICCIT), Slemani - Iraq | 2017 | ![]() |
![]() |
![]() |
||
A Survey of Email Service; Attacks, Security Methods and Protocols | بحث مجلة | International Journal of Computer Applications | 2017 | ![]() |
![]() |
![]() |
||
Symmetric ECC with Variable Key using Chaotic Map | بحث مجلة | International Journal of Computer Science Issues | 2017 | ![]() |
![]() |
![]() |