Follow
Wafaa Mustafa Abduallah
Wafaa Mustafa Abduallah
Lecturer of Computer Science, Duhok Polytechnic University, Kurdistan Region - Iraq
Verified email at dpu.edu.krd
Title
Cited by
Cited by
Year
Comprehensive Review of Artificial Intelligence and Statistical Approaches in Distributed Denial of Service Attack and Defense Methods
BA Khalaf, SA Mostafa, A Mustapha, MA Mohammed, WM Abduallah
IEEE Access, 2019
1592019
Acute lymphoblastic leukemia segmentation using local pixel information
SS Al-jaboriy, NNA Sjarif, S Chuprat, WM Abduallah
Pattern Recognition Letters 125, 85-90, 2019
792019
Modelling an adjustable autonomous multi-agent internet of things system for elderly smart home
SA Mostafa, SS Gunasekaran, A Mustapha, MA Mohammed, ...
Advances in Neuroergonomics and Cognitive Engineering: Proceedings of the …, 2020
632020
Idps: An integrated intrusion handling model for cloud
HM Alsafi, WM Abduallah, ASK Pathan
arXiv preprint arXiv:1203.3323, 2012
502012
Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach
WM Abduallah, AMS Rahma, ASK Pathan
Computers & Electrical Engineering 40 (4), 1390-1404, 2014
422014
A review on recent steganography techniques in cloud computing
OM Ahmed, WM Abduallah
Academic Journal of Nawroz University 6 (3), 106-111, 2017
272017
Stego-Based-Crypto Technique for High Security Applications
AMA Brifcani, WMA Brifcani
International Association of Computer Science and Information Technology …, 2010
232010
Real time implementation of stegofirewall system
MR Al-Sultan, SY Ameen, WM Abduallah
International Journal of Computing and Digital Systems 8 (5), 498-504, 2019
182019
GPUs Impact on Parallel Shared Memory Systems Performance
OMA LAILAN M. HAJI, RIZGAR R. ZEBARI , SUBHI R.M. ZEEBAREE, WAFAA MUSTAFA ...
International Journal of Psychosocial Rehabilitation 24 (8), 8030-8038, 2020
16*2020
New Data hiding method based on DNA and Vigenere Autokey
WM Abduallah, SRM Zeebaree
Academic Journal of Nawroz University 6 (3), 83-88, 2017
162017
A review on steganography techniques
WM Abduallah, AMS Rahma
American Scientific Research Journal for Engineering, Technology, and …, 2016
162016
An efficient ElGamal cryptosystem scheme
HI Hussein, WM Abduallah
International Journal of Computers and Applications 43 (10), 1088-1094, 2021
92021
A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks
ASK Pathan, WM Abduallah, S Khanam, HY Saleem
Simulation 89 (5), 616-634, 2013
52013
A modified table lookup substitution method for hiding data in DNA
HI Hussein, WM Abduallah
2018 International Conference on Advanced Science and Engineering (ICOASE …, 2018
42018
Reversible data hiding scheme based on 3-least significant bits and mix column transform
WM Abduallah, AMS Rahma, ASK Pathan
Security and Privacy in Communication Networks: 9th International ICST …, 2013
42013
A Review of Intrusion Detection Systems
HK Shaikha, WM Abduallah
Academic Journal of Nawroz University 6 (3), 101-105, 2017
32017
Tackling Intruders in Wireless Mesh Networks
ASK Pathan, S Khanam, HY Saleem, WM Abduallah
Distributed Network Intelligence, Security and Applications. CRC Press …, 2013
32013
A new data hiding technique based on irreducible polynomials
WM Abduallah, AMS Rahma, ASK Pathan
Journal of Emerging Technologies in Web Intelligence 5 (1), 2013
32013
Coverless Image Steganography
SF Khorshid, WM Abdullah
Academic Journal of Nawroz University 11 (3), 314-326, 2022
22022
A Smart Home Design Based on Ethernet
WM Abduallah, RZ Mahmood, DM Abdullah
Academic Journal of Nawroz University 6 (3), 59-63, 2017
22017
The system can't perform the operation now. Try again later.
Articles 1–20