Encryption-based image steganography technique for secure medical image transmission during the COVID-19 pandemic S Alkhliwi International Journal of Computer Science & Network Security 21 (3), 83-93, 2021 | 6 | 2021 |
Energy efficient cluster based routing protocol with secure IDS for IoT assisted heterogeneous WSN S Alkhliwi International Journal of Advanced Computer Science and Applications 11 (11), 2020 | 5 | 2020 |
Huffman Encoding with White Tailed Eagle Algorithm-based Image Steganography Technique S Alkhliwi Engineering, Technology & Applied Science Research (ETASR) 13 (2), 10453-10459, 2023 | 3 | 2023 |
An efficient dynamic access control and security sharing scheme using blockchain S Alkhliwi International Journal of ADVANCED AND APPLIED SCIENCES (IJAAS) 9 (8), 28-40, 2022 | 3 | 2022 |
A Closer Look on Challenges and Security Risks of Voice Over Internet Protocol Infrastructures AHA Omari, YA Alsariera, HS Alhadawi, MA Albawaleez, SS Alkhliwi International journal of computer science and network security: IJCSNS 22 (2 …, 2022 | 1 | 2022 |
Securing Locations of Mobile Nodes in Wireless Mesh Network’s S Alkhliwi International Journal of Advanced Computer Science and Applications 9 (11), 2018 | 1 | 2018 |
Sea Turtle Foraging Optimization-Based Controller Placement with Blockchain-Assisted Intrusion Detection in Software-Defined Networks S Alkhliwi Computers, Materials & Continua (CMC) journal 75, 4735-4752, 2023 | | 2023 |
Enhanced Security of Home Registration in the Hierarchical Mobile IPv6 Protocol for IoT Applications SS Alkhliwi Proceedings of the International Conference on Artificial Intelligence and …, 2020 | | 2020 |
Securing Mobility Location Management in Wireless Mesh Networks SS Alkhliwi PQDT-Global, 2018 | | 2018 |
Ahmad Taher Azar· Tarek Gaber· Diego Oliva· Fahmy M. Tolba Editors AE Hassanien | | |