Staff Portal
Sufyan Taih Faraj Al-Janabi (Professor)

PhD in Network Security

Information Technology - Computer Sciences and IT
sufyan.aljanabi@uoanbar.edu.iq

ScopusGoogle ScholarResearch GateORCIDPublonsFacebook


Biography

<p>&nbsp;&nbsp;Prof. Dr. Sufyan T. Faraj Al-Janabi was born in Haditha, Iraq (1971). He obtained his B.Sc. (1992), M.Sc. (1995), and Ph.D. (1999) in Electronic and Communications Engineering from the College of Engineering, Nahrain University in Baghdad. He started as a faculty member in the Computer Engineering Dept., at the University of Baghdad in 1999. Then he became the head of that department in 2001. From May 2004 to&nbsp;June 2006 he was the Dean of the College of Information Technology, at Nahrain University. He became the Dean of the College of Computer, University of Anbar, Ramadi from July 2006 to&nbsp;May 2010. Prof. (Faraj) Al-Janabi is the winner of the 1st Award for the Best Research Paper in Information Security from the Association of Arab Universities (AARU), Jordan, 2003. He also won the ISEP Fellowship 2009 and the Fulbright Fellowship 2010, USA. He is a member of ACM, ASEE, IACR, and IEEE. More information can be found on the personal website link at&nbsp;https://sites.google.com/view/sufyan-aljanabi</p> <p><strong>Research Interests:</strong>&nbsp;Internet protocols, information security, and quantum cryptography.</p> <p><a href="https://drive.google.com/file/d/1p8fLrrCe1NnmbiZry01H0AdcGREDCwIa/view?usp=sharing">Sufyan Al-Janabi CV</a></p> <p>&nbsp;</p>

Publication

<p>&nbsp;</p> <p><span style="font-size:18px"><strong><em>Patents:</em></strong></span></p> <ul> <li style="text-align:justify"><span style="font-size:16px"><span style="font-family:Times New Roman,Times,serif"><em>Development of Optical Network Models for Quantum Cryptography;</em> Iraqi Patent No.3009, 9/12/2001. <span style="color:blue"><u><a href="http://www.cosqc.gov.iq/html/Patent/Guide_ar.html" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> </ul> <p style="text-align:justify">&nbsp;</p> <p style="text-align:justify"><span style="font-size:18px"><strong><em>Books:</em></strong></span></p> <ul> <li style="text-align:justify"><span style="font-size:16px"><span style="font-family:Times New Roman,Times,serif"><em>INTELLIGENT TECHNIQUES AND CONSTRUCTIVE APPROACHES IN COMPUTING AND INFORMATION TECHNOLOGY</em>, Special Issue (Ed.), Int. J. Reasoning-based Intelligent Systems, Vol. 4, No. 4, 2012, Inderscience Enterprises Ltd. <span style="color:blue"><u><a href="https://www.inderscience.com/info/inarticletoc.php?jcode=ijris&amp;year=2012&amp;vol=4&amp;issue=4" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:16px"><span style="font-family:Times New Roman,Times,serif"><em>QUANTUM CRYPTOGRAPHIC KEY DISTRIBUTION IN OPTICAL NETWORKS, Lambert Academic Publishing (LAP), OmniScriptum GmbH &amp; Co. KG, Germany, 2016, ISBN 978-3-330-00474-0. </em><span style="color:blue"><u><a href="https://www.lap-publishing.com/catalog/details/store/gb/book/978-3-330-00474-0/quantum-cryptographic-key-distribution-in-optical-networks" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> </ul> <p style="text-align:justify">&nbsp;</p> <p style="text-align:justify"><span style="font-size:18px"><strong><em>Book Chapters:</em></strong></span></p> <ul> <li style="text-align:justify"><span style="font-size:16px"><span style="font-family:Times New Roman,Times,serif"><em>OPTICAL NETWORK MODELS FOR QUANTUM CRYPTOGRAPHY, in &ldquo;</em>Security in the Information Society&rdquo;, IFIP Advances in Information and Communication Technology, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, and Heba K. Aslan, Eds., Springer-Verlag US, &nbsp;Volume 86,&nbsp;2002,&nbsp;pp 435-451, ISBN 978-0-387-35586-3. <span style="color:blue"><u><a href="https://link.springer.com/book/10.1007%2F978-0-387-35586-3" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:16px"><span style="font-family:Times New Roman,Times,serif"><em>QUANTUM KEY DISTRIBUTION NETWORKS</em>, in &quot;Multidisciplinary Perspectives in Cryptology and Information Security&quot;, Sattar Sadkhan and Nidaa Abbas, Eds., IGI Global, 2014, ISBN13: 9781466658080; ISBN10: 1466658088; EISBN13: 9781466658097. <span style="color:blue"><u><a href="https://www.igi-global.com/chapter/quantum-key-distribution-networks/108026" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> </ul> <p style="text-align:justify">&nbsp;</p> <p style="text-align:justify"><span style="font-size:18px"><strong><em>Publication:</em></strong></span></p> <ol> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif">Mahmood H. Farhan, Khalid Shaker, and Sufyan Al-Janabi, <em>Copy-move forgery detection in digital image forensics: A survey</em>; Multimedia Tools and Applications, Springer<em>, </em>Published online: 07 February 2024. </span><span style="font-size:10.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><a href="https://doi.org/10.1007/s11042-024-18399-2"><span style="font-size:11.0pt"><span style="color:blue">https://doi.org/10.1007/s11042-024-18399-2</span></span></a></span></span>&nbsp; <u>&nbsp;<span style="font-size:10.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><a href="https://link.springer.com/article/10.1007/s11042-024-18399-2"><strong><span style="font-size:9.0pt"><span style="font-family:&quot;Calibri&quot;,sans-serif"><span style="color:#0563c1">LINK</span></span></span></strong></a></span></span></u></span></span></li> <li style="text-align:justify"><span style="font-size:11pt"><span style="font-family:Calibri,sans-serif"><span style="font-family:&quot;Times New Roman&quot;,serif">Mahmoud H. Farhan, Khalid Shaker, Sufyan Al-Janabi, <em>Efficient Approach for the Localization of Copy-Move Forgeries Using PointRend with RegNetX</em>; Published Online First: Baghdad Science Journal, Online: September, 2023. </span><span style="font-size:10.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><a href="https://dx.doi.org/10.21123/bsj.2023.8304"><span style="font-size:11.0pt"><span style="color:blue">https://dx.doi.org/10.21123/bsj.2023.8304</span></span></a></span></span>&nbsp; &nbsp;&nbsp;<u><span style="font-size:10.0pt"><span style="font-family:&quot;Times New Roman&quot;,serif"><a href="https://dx.doi.org/10.21123/bsj.2023.8304"><strong><span style="font-size:9.0pt"><span style="font-family:&quot;Calibri&quot;,sans-serif"><span style="color:#0563c1">LINK</span></span></span></strong></a></span></span></u></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://www.worldscientific.com/doi/10.1142/S0219467825500020">Detection of Fake Colorized Images based on Deep Learning</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://online-journals.org/index.php/i-joe/article/view/40267">Secure Data Computation Using Deep Learning and Homomorphic Encryption: A Survey</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://ieeexplore.ieee.org/document/10100318">Double Dual Convolutional Neural Network (D2CNN) for Copy-Move Forgery Detection</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://www.worldscientific.com/doi/full/10.1142/S1469026823500189">Fake Colorized Image Detection Based on Special Image Representation and Transfer Learning</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://journal.esj.edu.iq/index.php/IJCM/article/view/584">Security Attacks on E-Voting System Using Blockchain</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://www.mdpi.com/1999-5903/15/1/39">Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://aip.scitation.org/doi/10.1063/5.0112122">A survey on provisioning and scheduling algorithms for scientific workflows in cloud computing</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://online-journals.org/index.php/i-jim/article/view/33173">Valid Blockchain-Based E-Voting Using Elliptic Curve and Homomorphic Encryption</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://www.mdpi.com/2073-431X/11/7/111">Multi-Controllers Placement Optimization in SDN by the Hybrid HSA-PSO Algorithm</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://www.worldscientific.com/doi/10.1142/S021946782350050X">Fake Colorized Image Detection Approaches: A Review</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="http://pen.ius.edu.ba/index.php/pen/article/view/3114">Using metaheuristics to improve the placement of multi-controllers in software-defined networking enabled clouds</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><a href="https://ieeexplore.ieee.org/document/9719389">Enhanced Iterated Local Search for Scheduling of Scientific Workflows</a></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Saba Abdul-Baqi Salman, Sufyan Al-Janabi, Ali Makki Sagheer, <em>A Review on E-Voting Based on Blockchain Models</em>; Iraqi Journal of Science (IJS) (EISSN: 2312-1637, ISSN: 0067-2904, CiteScore: 0.3), Vol. 63, No. 3, March 2022, pp. 1362-1375. DOI: 10.24996/ijs.2022.63.3.38. <a href="https://ijs.uobaghdad.edu.iq/index.php/eijs/article/view/4800" style="color:blue; text-decoration:underline"><span style="color:#4f81bd">LINK</span></a></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">&nbsp;Neamah Sattar Radam, Sufyan Al-Janabi and Khalid Shaker, <em>Optimisation Methods for the Controller Placement Problem in SDN: A Survey</em>; Webology (CiteScore: 1.1, ISSN: 1735-188X), Vol. 19, No. 1, 2022, pp. 3130-3149. DOI: 10.14704/WEB/V19I1/WEB19207. <a href="https://www.webology.org/abstract.php?id=971" style="color:blue; text-decoration:underline"><span style="color:#4f81bd">LINK</span></a></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Alaa Abdalqahar Jihad, Sufyan T. Faraj Al-Janabi, and Esam Taha Yassen, <em>Optimized scheduling of scientific workflows based on iterated local search</em>; Indonesian Journal of Electrical Engineering and Computer Science (CiteScore: 2.0, ISSN: 2502-4752), Vol.25, No.3, March 2022, pp. 1615-1624, DOI: 10.11591/ijeecs.v25.i3.pp1615-1624. <a href="http://ijeecs.iaescore.com/index.php/IJEECS/article/view/25694" style="color:blue; text-decoration:underline"><span style="color:#4f81bd">LINK</span></a></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Noor Mahmoud Ibrahim, Sufyan T. Faraj Al-Janabi, Belal Al-Khateeb, Electricity-Theft Detection in Smart Grid Based on Deep Learning, Bulletin of Electrical Engineering and Informatics, Vol.10, No.4, August 2021, pp. 2285-2292, ISSN: 2302-9285, DOI: 10.11591/eei.v10i4.2875. <a href="https://beei.org/index.php/EEI/article/view/2875" style="color:blue; text-decoration:underline"><span style="color:#4f81bd">LINK</span></a></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">&nbsp;Amjad H. Shehab and Sufyan T. Faraj Al-Janabi, <em>Microsoft Azure IoT-based Edge Computing for Smart Homes</em>; 2020 International Conference on Decision Aid Sciences and Application (DASA), Sakheer, Bahrain, 8-9 Nov. 2020, pp. 315-319, doi: 10.1109/DASA51403.2020.9317274. <a href="https://ieeexplore.ieee.org/document/9317274" style="color:blue; text-decoration:underline"><span style="color:#0070c0">LINK</span></a> </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sameer I. Ali Al-Janabi, Sufyan T. Faraj Al-Janabi and Belal Al-Khateeb, <em>Image Classification using Convolution Neural Network Based Hash Encoding and Particle Swarm Optimization</em>;&nbsp;2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI), Sakheer, Bahrain, 26-27 Oct. 2020, pp. 1-5, doi: 10.1109/ICDABI51230.2020.9325655. <a href="https://ieeexplore.ieee.org/document/9325655" style="color:blue; text-decoration:underline"><span style="color:#0070c0">LINK</span></a></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Ali A. Abdul Lateef, Sufyan T. Faraj Al-Janabi and Belal Al-Khateeb, <em>Hybrid Intrusion Detection System Based on Deep Learning</em>; 2020 International Conference on Data Analytics for Business and Industry: Way Towards a Sustainable Economy (ICDABI), Sakheer, Bahrain, 26-27 Oct. 2020, pp. 1-5, doi: 10.1109/ICDABI51230.2020.9325669. <a href="https://ieeexplore.ieee.org/document/9325669" style="color:blue; text-decoration:underline"><span style="color:#0070c0">LINK</span></a></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Noor Hamad Abid and Sufyan Al-Janabi,<em> The Secure I-Voting System Helios++;</em> International Journal of Computing and Digital Systems (e-ISSN: 2210-142X, CiteScore = 0.4, SJR = 0.108), University of Bahrain, Vol. 10, No. 1, pp. 77-83, Jan. 2021<em>. </em>DOI: <a href="http://dx.doi.org/10.12785/ijcds/100108" style="color:blue; text-decoration:underline">http://dx.doi.org/10.12785/ijcds/100108</a> &nbsp;<a href="https://journal.uob.edu.bh/handle/123456789/3963" style="color:blue; text-decoration:underline">LINK</a></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Wael Ali Hussien and Sufyan Al-Janabi,<em> Using DSDM for Developing Graduate Study Based Cryptanalysis Projects</em>; i-manager&rsquo;s Journal on Communication Engineering and Systems, 2020 <em>. </em><span style="color:blue"><u><a href="https://imanagerpublications.com/journalsfulldetails/15/JournalonCommunicationEngineeringandSystems" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Ahmed J. Abd and Sufyan Al-Janabi,<em> Classification and Identification of Classical Cipher Type Using Artificial Neural Networks</em>, Journal of Engineering and Applied Sciences, Vol. 14, No. 11, pp. 3549-3556, 2019. DOI: 10.3923/jeasci.2019.3549.3556. <span style="color:blue"><u><a href="https://medwelljournals.com/abstract/?doi=jeasci.2019.3549.3556" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Ali Azzawi, Sufyan Al-Janabi, and Belal Al-Khateeb,<em> Survey on Intrusion Detection Systems based on Deep Learning</em>; Periodicals of Engineering and Natural Sciences, ISSN 2303-4521, Vol. 7, No. 3, September 2019, pp.1074-1095, DOI: http://dx.doi.org/10.21533/pen.v7i3.635. <span style="color:blue"><u><a href="http://pen.ius.edu.ba/index.php/pen/article/view/635" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Amjad Shehab and Sufyan Al-Janabi,<em> Edge Computing: Review and Future Directions</em>; REVISTA AUS Journal, Special Issue No. 26-2, 2019, pp. 368-380. / DOI: 10.4206/aus.2019.n26.2.45.&nbsp;&nbsp;</span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Noor Hamad Abid, <em>Security of Internet Voting Schemes: A Survey</em>; REVISTA AUS Journal, Special Issue No. 26-2, 2019, pp. 260-270. / DOI: 10.4206/aus.2019.n26.2.33.&nbsp;</span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Noor Hamad Abid and Sufyan Al-Janabi,<em> A Framework for I-Voting based on Helios and Public-Key Certificates</em>; REVISTA AUS Journal, Special Issue No. 26-2, 2019, pp. 234-243. / DOI: 10.4206/aus.2019.n26.2.30.&nbsp;</span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sameer Al-Janabi, Sufyan Al-Janabi, and Belal Al-Khateeb, <em>Image Retrieval using Neural Network based Hash Encoding: A Survey</em>; REVISTA AUS Journal, Special Issue No. 26-2, 2019, pp. 396-409. / DOI: 10.4206/aus.2019.n26.2.48/.</span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Belal Al-Khateeb, and Ahmed J. Abd,<em> Intelligent Techniques in Cryptanalysis: Review and Future Directions</em>, UHD Journal of Science and Technology, University of Human Development (UHD), Sulaimaniya, KRG- Iraq, Vol.1, No.1, pp. 1-9, 2017, DOI: 10.21928/uhdjst.v1n1y2017.pp1-10<em>. </em><span style="color:blue"><u><a href="http://journals.uhd.edu.iq/index.php/uhdjst/article/view/1" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Dana Kareem Ghareeb and Sufyan Al-Janabi,<em> Real-Life Enhancement of QoE for Social Network Applications, </em>Annual Conference on New Trends in Information &amp; Communications Technology Applications (NTICT 2017), Baghdad, 7-9 March 2017<em> </em>pp. 63-68<em> (978-1-5386-2962-8/17/$31.00 &copy;2017 IEEE 63). </em><span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/7976139/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Ali Jamal, Belal Al-Khateeb, and Sufyan Al-Janabi,<em> Query Reformulation Using WordNet and Genetic Algorithm</em>; Annual Conference on New Trends in Information &amp; Communications Technology Applications (NTICT 2017), Baghdad, 7-9 March 2017, pp. 91-96<em> (978-1-5386-2962-8/17/$31.00 &copy;2017 IEEE 91). </em><span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/7976138/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi,<em> On the Necessity of Establishing a National Cybersecurity Testbed, </em>Journal of University of Human Development, Vol.2, No.4, Dec. 2016, pp. 428-436. <span style="color:blue"><u><a href="http://journals.uhd.edu.iq/index.php/juhd/article/view/522" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Wael Ali Hussien,<em> </em><em>Architectural Design of General Cryptanalysis Platform for Pedagogical Purposes</em>, i-manager&rsquo;s Journal on Software Engineering, Vol. 11, No. 1, July - September 2016, pp.1-12, DOI: https://doi.org/10.26634/jse.11.1.8189<em>. </em><span style="color:blue"><u><a href="https://imanagerpublications.com/article/8189/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi,<em> Towards a Framework for Supporting Unconditionally-Secure Authentication Services within E-Government Infrastructures, </em>Journal of University of Human Development, Vol.2, No.3. August 2016 /pp490-497.<br /> http://dx.doi.org/10.21928/juhd.20160203.24.&nbsp;<span style="color:blue"><u><a href="http://journals.uhd.edu.iq/index.php/juhd/article/view/549" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Dana Kareem Ghareeb,<em> Proposed Approach for Enhancement of QoE to Support e-Society, </em>Journal of University of Human Development, Vol.2, No.3. August 2016 /pp534-541.&nbsp;<span style="color:blue"><u><a href="http://journals.uhd.edu.iq/index.php/juhd/article/view/556" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Ali Jamal, Belal Al-Khateeb, and Sufyan Al-Janabi,<em> Web Search Enhancement Using WordNet Query Expansion Technique, </em>Journal of University of Human Development, Vol.2, No.3. August 2016 /pp542-547. <span style="color:blue"><u><a href="http://journals.uhd.edu.iq/index.php/juhd/article/view/558" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Alaa K. Jumaa, Sufyan Al-Janabi, and Nazar Ali,<em> An Enhanced Algorithm for Hiding Sensitive Association Rules Based on ISL and DSR Algorithms, </em>International Journal of Computing and Network Technology (IJCNT), University of Bahrain, Bahrain, No. 3, Vol.3, Sept. 2015, DOI: http://dx.doi.org/10.12785/IJCNT/030301. <span style="color:blue"><u><a href="https://journal.uob.edu.bh/handle/123456789/1746" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Alaa K. Jumaa, Sufyan Al-Janabi, and Nazar Ali,<em> Hiding Association Rules over Privacy-Preserving Distributed Data Mining; </em>Kirkuk University Journal- Scientific Studies, Vol. 9, No.1, 2014, pp. 59-72. <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=89609" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Ali Jubair Dawood, and Abeer D. Salman,<em> Enhancing the Security and Privacy of WBAN-Based Distributed Storage Systems;</em> &nbsp;Journal of UHD Journal, Vol.1, No.2, pp. 288-294, 2015 (Papers of the 1st &nbsp;Scientific Conference of the University of Human Development, Sulaimaniya, Iraq, 1-2 April 2014). <span style="color:blue"><u><span dir="RTL"><a href="http://journals.uhd.edu.iq/index.php/juhd/article/view/665" style="color:blue; text-decoration:underline" target="_blank">LINK</a></span></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Ali Jubair Dawood, and Ekram H. Hassan,<em> Development and Simulation of Enhanced Key Management Scheme for WBANs;</em> Journal of UHD, Vol.1, No.2, pp. 280-287, April 2015 (Papers of the 1st &nbsp;Scientific Conference of the University of Human Development, Sulaimaniya, Iraq, 1-2 April 2014). <span style="color:blue"><u><a href="http://journals.uhd.edu.iq/index.php/juhd/article/view/664" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Foad S. Mubarek, Sufyan Al-Janabi, and Kashif Kifayat, <em>Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol;</em> the 6th International Conference on Developments in e-Systems Engineering (DeSE2013), Abu Dhabi, UAE, 16-18 Dec. 2013. <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/7041125/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Ali Jubair Dawood, and Ikram H. Hasan,<em> Biometric-Based Authentication and Key Management Scheme for WBANs;</em> i-manager&#39;s Journal on Information Technology (JIT), Vol. 2, No. 2, March-May, 2013, pp. 23-31, DOI: https://doi.org/10.26634/jit.2.2.2286. <span style="color:blue"><u><a href="https://imanagerpublications.com/article/2286/JournalonInformationTechnology" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Waleed Kareem Awad, and Kashif Kifayat,<em> Trusted E-Contracts in Collaborative Intra-Cloud Business-to-Business Environments;</em> i-manager&rsquo;s Journal on Communication Engineering and Systems (JCS), Vol. 2, No. 3, May &ndash; July, 2013, pp. 1-12, https://doi.org/10.26634/jcs.2.3.2331. <span style="color:blue"><u><a href="https://imanagerpublications.com/viewarticles/15/294/JCSVol2Iss3" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Ali Jubair Dawood, and Abeer D. Salman,<em> Distributed Data Security and Privacy in WBAN-Related e-Health Systems</em>; AL-Mansour Journal, No.20, pp. 121-132, 2013 (Special Issue of the Proceeding of The 12th Scientific Conference of Al-Mansour University College, Baghdad, Iraq, 4-5 May 2013). <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=fulltext&amp;aId=81830" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Alaa K. Jumaa, Sufyan Al-Janabi, and Nazar Ali,<em> Hiding Sensitive Frequent Itemsets over Privacy-Preserving Distributed Data Mining; </em>Rafidain J. of Comp. &amp; Maths. (Special Issue of the 5th Scientific Conference on Information Technology, Dec. 19-20, 2012), Vol. 10, No. 1, pp. 91-105, University of Mosul, Iraq, 2013. <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=71761" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Sameeh Jasim, and Kashif Kifayat,<em> Mediated IBC-Based Management System of Identity and Access in Cloud Computing</em>, The 3rd Engineering Conference, College of Engineering, Tikrit University, 11-12 December 2012 (Appeared in Tikrit Journal of Engineering Sciences, Vol. 20, No. 3, pp.75-86, 2013). <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=76094" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Alaa K. Jumaa, Sufyan Al-Janabi, and Nazar Ali,<em> Privacy-Preserving Distributed Knowledge Discovery: Survey and Future Directions</em>; Special Issue: Intelligent Techniques and Constructive Approaches in Computing and Information Technology, Sufyan Al-Janabi and Jawad Ali, Eds., Inderscience Enterprises Ltd, Int. J. Reasoning-based Intelligent Systems, Vol. 4, No. 4, 2012, pp. 235-244. <span style="color:blue"><u><a href="https://www.inderscience.com/info/inarticletoc.php?jcode=ijris&amp;year=2012&amp;vol=4&amp;issue=4" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Mohammed I. Salman, and Omar Abul Maati,<em> Message Ferrying-Ad Hoc On-Demand Distance Vector (MF-AODV) Protocol</em>, The 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNET 2012), 25th and 26th June 2012, Liverpool, UK, pp. 328-333. <span style="color:blue"><u><a href="http://www.cms.livjm.ac.uk/pgnet2012/Proceedings/Papers/1569602521.pdf" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Yaseen S. Yaseen,&nbsp; and Bob Askwith,<em> The Bus Ad hoc On-demand Distance Vector (BAODV) Routing Protocol</em>; The 13th Annual Post Graduate Symposium on the Convergence of Telecommunications, Networking and Broadcasting (PGNET 2012), 25th and 26th June 2012, Liverpool, UK, pp. 7-12. <span style="color:blue"><u><a href="http://www.cms.livjm.ac.uk/pgnet2012/Proceedings/Papers/1569582285.pdf" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Hussien Khalid Abdul-Razzaq,<em> Email Security Using Two Cryptographic Hybrids of Mediated and Identity-Based Cryptography</em>; i-manager&#39;s Journal on Software Engineering (JSE), Vol. 6, No. 3, pp. 1-12, January-March 2012, DOI: https://doi.org/10.26634/jse.6.3.1786. <span style="color:blue"><u><a href="https://imanagerpublications.com/article/1786/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Amer Kais Obaid,<em> Development of Certificate Authority Services for Web Applications;</em> Proceedings of the First International Conference on Future Communication Networks (ICFCN &rsquo;2012), pp. 135-140, Baghdad, Iraq, 10-12 April 2012 (IEEE Xplore). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/6206857/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span> </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Sameeh Jasim, and Kashif Kifayat,<em> Management of Identity and Access in the Cloud;</em> Proceedings of the Second Conference of College of Computer, University of Anbar (CCIT 2012), Ramadi, Iraq, 4-5 April 2012 (Special Issue: Journal of University of Anbar for Pure Science, Volume 6, Issue 2, 2012, pp. 22-33). <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=63234" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Waleed Kareem Awad, and Kashif Kifayat,<em> Trusted Cloud Computing;</em> Proceedings of the Second Conference of College of Computer, University of Anbar (CCIT 2012), Ramadi, Iraq, 4-5 April 2012 (Special Issue: Journal of University of Anbar for Pure Science, Volume 6, Issue 2, 2012, pp. 6-13). <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=63157" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Foad Mubarek and Sufyan Al-Janabi,<em> Key Management Scheme for Mobile Wireless Sensor Networks;</em> Proceedings of the Second Conference of College of Computer, University of Anbar (CCIT 2012), Ramadi, Iraq, 4-5 April 2012(Special Issue: Journal of University of Anbar for Pure Science, Volume 6, Issue 2, 2012, pp. 58-64). <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=63239" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Yaseen S. Yaseen,<em> Performance Evaluation of AODV and DSDV Routing Protocols Using CityMob in VANETs</em>, i-manager&#39;s Journal on Communication Engineering and Systems (JCS), Vol. 1, No. 1, pp. 1-10, November 2011 - January 2012, https://doi.org/10.26634/jcs.1.1.1726. <span style="color:blue"><u><a href="https://imanagerpublications.com/viewarticles/15/169/JCSVol1Iss1" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and David Anderson, <em>Reforming the Higher Education System in Iraq: Internationalization via Decentralization</em>, i-manager&#39;s Journal of Educational Technology, Volume 8, No. 3, pp. 1-14, October &ndash; December Issue, 2011, DOI: https://doi.org/10.26634/jet.8.3.1634. <span style="color:blue"><u><a href="https://imanagerpublications.com/article/1634/JournalofEducationalTechnology" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Ali Shuaib, <em>Simulation Study of Wired/Wireless Fieldbus Systems Using Store and Forward Mode</em>, Engineering and Technology Journal, University of Technology, Baghdad, Vo1. 29, No. 16, pp. 3271-3290, 2011. <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=33256" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Ali Makki Sagheer, <em>Enhancement</em><em> of E-Government Security Based on Quantum Cryptography</em>, Proceedings of the International Arab Conference on Information Technology (ACIT&#39;2011), Naif Arab University for Security Science (NAUSS), Riyadh, Saudi Arabia, 11-14 December 2011. <span style="color:blue"><u><a href="https://acit2k.org/ACIT/index.php/proceedings/acit-2011-proceedings" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Mayada Rasheed,<em> Public-Key Cryptography Enabled Kerberos</em><em> Authentication</em>, Proceedings of theFourth International Conference on Developments in eSystems Engineering (DeSE &rsquo;2011), The British University in Dubai, UAE, 6th-8th December 2011, pp. 209-214 (IEEE Xplore). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/6149941/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Hadeel Amjad Saed, <em>A Neural Network-Based Anomaly Intrusion Detection System;</em> Proceedings of the Fourth International Conference on Developments in eSystems Engineering (DeSE &rsquo;2011), The British University in Dubai, UAE, 6th-8th December 2011, pp. 221-226 (IEEE Xplore). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/6149943/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Khalida Shaaban Rijab, and Ali Makki,<em> Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher</em>, Proceedings of the Fourth International Conference on Developments in eSystems Engineering (DeSE &rsquo;2011), The British University in Dubai, UAE, 6th-8th December 2011, pp. 413-418 (IEEE Xplore). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/6150015/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Ruqaya Rabee Hashim,<em> Key Reconciliation Techniques in Quantum Key Distribution</em>, Proceedings of the First Engineering Conference of the College of Engineering, University of Anbar, Ramadi, Iraq, 20-21 November 2011. </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Neema Enad,<em> Development of an Anti-Censorship System</em>, Proceedings of the First Engineering Conference of the College of Engineering, University of Anbar, Ramadi, Iraq, 20-21 November 2011. </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Muayad S. Kod,<em> On the Development of NDIS Intermediate Driver-Based Virtual Private Networks</em>, Proceedings of the Third International Scientific Conference of Salahaddin University-Erbil, 18-20 October 2011. </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Saif Bassam,<em> Proxy-Based Internet Gateways</em>, Proceedings of the Second Scientific Conference on Applied Scientific Research, Babylon University, Babylon, Iraq, 30-31 May 2011. </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Zainab Ali,<em> Development of Secure e-Payment System</em>, Proceedings of the Second Scientific Conference on Applied Scientific Research, Babylon University, Babylon, Iraq, 30-31 May 2011. </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi,<em> A Framework for Management of Water Resources Based on Internet-Enabled Wireless Sensor Networks,</em> University of Anbar Symposium on Water Resources, Ramadi, 22-23 March 2011. </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Hussien Khalid Abdul-Razzaq,<em> Combining Mediated and Identity-Based Cryptography for Securing E-Mail</em>; The International <em>Conference</em> on Digital Enterprise and Information Systems (DEIS2011), London Metropolitan Business School, pp. 1-15, UK, July 20-22, 2011 (Springer). <span style="color:blue"><u><a href="https://link.springer.com/book/10.1007%2F978-3-642-22603-8" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Omer K. Jasim,<em> Reducing the </em><em>Authentication Cost in Quantum Cryptography; </em>The 12th Annual Post Graduate Symposium on the <em>Convergence</em> of Telecommunications, Networking and Broadcasting (PGNet2011), pp. 363-368, 27th?28th June 2011, Liverpool, UK. <span style="color:blue"><u><a href="http://www.cms.livjm.ac.uk/pgnet2011/Proceedings/Papers/m1569449157-al-janabi.pdf" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi,<em> </em><em>Nahrainfish: A Green Cryptographic Block Cipher; </em>The First Saudi International Electronics, Communications and Electronics Conference (SIECPC&#39;11), April 23-26, 2011 in Riyadh, Saudi Arabia (IEEE Xplore). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/5876890/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Joseph E. Urban,<em> Strategic Plan for Enhancing Higher Education Computing Degree Programs in Iraq</em>; IEEE EDUCON Education Engineering, pp. 86-90, April 4 - 6, 2011, Amman, Jordan (IEEE Xplore). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/5773120/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and William Sverdlik,<em> Towards Long-Term International Collaboration in Computer Science Education</em>; IEEE EDUCON Education Engineering, pp. 94-100, April 4 - 6, 2011, Amman, Jordan (IEEE Xplore). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/5773118/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Omar A. Athab, and Kasim M. Al-Aubidy,<em> Windows-Based Active-Router Architecture</em>, Journal of University of Anbar for Pure Science, Vol.4, No.3, pp.112-119, 2010. <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=15560" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Integrating Quantum Cryptography into SSL; Ubiquitous Computing and Communication Journal, Vol. 5, Special Issue of Ubiquitous Computing Security Systems, pp. 1778-1788, 2010. </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and David Anderson, <em>Balancing Centralization and Decentralization in Iraqi Higher Education; </em>Proceedings of the Midwest Regional Comparative and International Society Conference, MI, USA, October 29-30, 2010. <em>&nbsp;</em></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">William Sverdlik and Sufyan Al-Janabi, <em>Enhancement of Student Programming Skills Using Distributed Collaborative Programming</em>; Proceedings of the Midwest Regional Comparative and International Society Conference, MI, USA, October 29-30, 2010. </span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Omar A. Athab, and Kasim M. Al-Aubidy,<em> Windows-based Active-Router Design and Evaluation</em><em>; </em>Proceedings of the 6th International Multi-Conference on Systems, Signals and Devices (SSD&rsquo;09), Vol. III, Tunisia March 23-26, 2009 (<u>IEEE Xplore</u>). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/4956813/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Saad Al-Tak and Sufyan Al-Janabi, <em>Hybrid Wired/Wireless </em><em>Profibus</em><em> Timing Analysis Under Transient Faults;</em> i-Manager&#39;s Journal on Software Engineering, (July-Sep., 2008): 12-22, DOI: https://doi.org/10.26634/jse.3.1.296. <span style="color:blue"><u><a href="https://imanagerpublications.com/article/296/JournalonSoftwareEngineering" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, <em>A Novel </em><em>Extension</em><em> of SSL/TLS Based on Quantum Key Distribution</em><em>;</em> Proceedings of the International Conference on Computer and Communication Engineering 2008 (ICCCE08), VOLUME I, pp. 919-922, Malaysia, May 13-15, 2008 (<u>IEEE Xplore</u>). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/4580740/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, Nidhal Ezzat, and Sinan Ghassan,<em> Investigation of </em><em>Java</em><em> Smart Card Technology for Multi-Task Applications;</em> (The First Scientific Conference of College of Computer, University of Anbar - CCIT2008), Journal of University of Anbar for Pure Science, Vol. 2, No. 1, pp. 12-23, 2008. <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=15423" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, <em>Towards a Strategy for the Sustainable Development of IT Section in A-Anbar Province; </em>Symposium of Sustainable Development of Al-Anbar, University of Anbar, Ramadi, Iraq, March 2008. &nbsp;</span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, <em>A New Block Cipher (Nahrainfish) Based on Some AES Finalists</em>; Journal of University of Anbar for Pure Science, Vol. 1, No. 2, pp. 111-125, 2007. <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=issueTOC&amp;isId=1692&amp;uiLanguage=ar" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Saad Al-Tak and Sufyan Al-Janabi, <em>PROFIBUS Timing Analysis Under Transient Faults;</em> Asian Journal of Information Technology, Medwell Online, Vol.6, No.7, pp. 806-816, 2007. <span style="color:blue"><u><a href="http://medwelljournals.com/abstract/?doi=ajit.2007.806.816" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Saad Al-Tak and Sufyan Al-Janabi, Inaccessibility in PROFIBUS due to transient faults; Proceedings of the International Arab Conference on Information Technology (ACIT&#39; 2007), Syria, 26-28 November 2007.<em> </em><span style="color:blue"><u><a href="https://acit2k.org/ACIT/index.php/proceedings/acit-2007-proceeding" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Media A. Ali,<em> Design and Implementation of SET-Enabled E-Commerce System;</em> Journal of Engineering and Sustainable Development, Al-Mustansiriya University, Vol. 12, No. 2, pp. 31-49, 2008 (A preliminary version of it appeared in the proceedings of the 3rd International Conference on Information Technology (ICIT&#39; 2007), Al-Zaytoonah University, Jordan, May 9-11, 2007). <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=article&amp;aId=27977" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, <em>Unconditionally Secure Authentication in Quantum Key Distribution;</em> Iraqi Journal of Computers, Communication, Control, and Systems Engineering, Vol. 6, No. 3, pp. 47-63, 2006 (A preliminary version under the title <em>Defeating a man-in-the-middle attack in quantum key distribution</em> appeared in the Proceedings of the 5th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP&rsquo;06), Patras, Greece, 2006). <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=issueTOC&amp;isId=4093&amp;uiLanguage=ar" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, <em>General Two-Party Oblivious Circuit Evaluation;</em> Proceedings of the 18th International Conference on Microelectronics (ICM 2006), pp. 210-213, KFUPM, Dhahran, KSA, 16-19 December 2006 (IEEE Xplore). <span style="color:blue"><u><a href="https://ieeexplore.ieee.org/document/4243686/" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, <em>Towards Arab Scientific Collaboration in the Field of Quantum Cryptography;</em> Proceedings of the 4th Symposium on Scientific Research and Technological Development Outlook in the Arab World, Damascus, Syria, 11-14 December 2006.</span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Firas Rasmi, <em>Design and Implementation of a Transparent Secure LAN; </em>Journal of Engineering, University of Baghdad, Vol. 12, No. 4, pp. 1063 - 1076, 2006 (A preliminary version appeared in the Proceedings of the 3rd Symposium on Scientific Research and Technological Development Outlook in the Arab World, Riyadh, KSA, April 2004).<em> </em><span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=issueTOC&amp;isId=1238&amp;uiLanguage=ar" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi and Mohammed Tariq, <em>Secure E-Mail System Using S/MIME and IB-PKC;</em> Engineering and Technology Journal, University of Technology, Vol. 25, No. 4, pp. 646-668, 2007 (A preliminary version appeared in the Proceeding of the 6th International Philadelphia Engineering Conference (IPEC 2006), Amman, Jordan, 19-21 Sept. 2006, pp. 713-722. <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=issueTOC&amp;isId=1439&amp;uiLanguage=ar" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Mohammed Tawfiq, and Sufyan Al-Janabi, and Abdul-Kareem Kadhim,<em> Key Exchange Protocol Supporting Mobility and Multihoming;</em> Anbar Journal of Engineering Sciences, Vol. 1, No. 1, pp.11-30, 2007. <span style="color:blue"><u><a href="https://www.iasj.net/iasj?func=issueTOC&amp;isId=2125&amp;uiLanguage=ar" style="color:blue; text-decoration:underline" target="_blank">LINK</a></u></span></span></span></li> <li style="text-align:justify"><span style="font-size:14px"><span style="font-family:Tahoma,Geneva,sans-serif">Sufyan Al-Janabi, <em>A Novel Quantum Cryptographic Error Elimination Technique Using Simple Hamming

Lectures


# المادة اسم المحاضرة المرحلة التحميل مشاهدة