Enabling Efficient Coexistence of DSRC and C-V2X in Vehicular Networks KZ Ghafoor, M Guizani, L Kong, HS Maghdid, KF Jasim
IEEE Wireless Communications, 2019
79 2019 MITIGATING IPv6 SECURITY VULNERABILITIES HA Dawood, KF Jasim
2013 International Conference on Advanced Computer Science Applications and …, 2013
9 2013 Analysis of encryption algorithms proposed for data security in 4g and 5g generations KF Jasim, KZ Ghafoor, HS Maghdid
ITM Web of Conferences 42, 01004, 2022
7 2022 Analysis the Structures of Some Symmetric Cipher Algorithms Suitable for the Security of IoT Devices KF Jasim, RJ Ismail, AAN Al-Rabeeah, S Solaimanzadeh
Cihan University-Erbil Scientific Journal 5 (2), 13-19, 2021
6 2021 Deep learning-based prediction of lithium-ion batteries state of charge for electric vehicles in standard driving cycle T Hai, HA Dhahad, KF Jasim, K Sharma, J Zhou, H Fouad, W El-Shafai
Sustainable Energy Technologies and Assessments 60 (December 2023), 103461, 2023
5 2023 Comparative study of some symmetric ciphers in mobile systems KF Jasim, IF Al Shaikhli
The 5th International Conference on Information and Communication Technology …, 2014
5 2014 Mobile technology generations and cryptographic algorithms: Analysis study KF Jasim, IF Al-Shaikhli
2015 4th International Conference on Advanced Computer Science Applications …, 2015
4 2015 Enhancing Wireless Sensor Networks Routing Protocols Based on Cross Layer Interaction RJ Ismail, KF Jasim, SJ Ismael, SAM Solaimanzadeh
Cihan University-Erbil Scientific Journal 5 (2), 52-55, 2021
1 2021 Analysis of Confidentiality Algorithms in Different Mobile Generations KF Jasim, IF Al-Shaikhli
Conference of Cihan University-Erbil on Communication Engineering and …, 2017
1 2017 Some Applications of Soft -Closed Sets in Soft Closure Spaces S Saleh, LR Flaih, KF Jasim
Communications in Mathematics and Applications 14 (2), 481-492, 2023
2023 Comparison the Encryption Algorithms and Design Encryption Software for the Security of SMS KF Jasim, OMA AL-Atraqchi, SRM Amin
6th International Conference on Sustainable Science and Technology (ICSuSaT …, 2023
2023 Some Applications of Soft -Closed Sets in Soft Closure Spaces S Saleh, LR Flaih, KF Jasim
Communications in Mathematics and Applications 14 (2), 481, 2023
2023 A perspective on the Development of Quantum Computers and the Security challenges LR Fleih, AAN Alrabeeah, KF jasim
4th International Conference on Communication Engineering and Computer …, 2022
2022 Review of IoT and Robotics application (Special case Study in Iraq and Kurdistan Region AA Nahi, L Flaih, KF Jasim, R Hossian
4th International Conference on Communication Engineering and Computer …, 2022
2022 ANALYSIS THE SECURITY OF SOME CIPHERS IN INDUSTRIAL APPLICATIONS OF WIRELESS SENSORS NETWORKS KF Jasim, MH Shukur, AAN Alrabeeah, LR Fleih
4th International Conference on Communication Engineering and Computer …, 2022
2022 Analysis the Components of SNOW 3G and ZUC Ciphers in Mobile Systems IFAS Khalid Fadhil Jasim
International Journal of Engineering & Technology 7 (4.15), 519-523, 2018
2018 Analysis Randomness Properties of Basic Components of SNOW 3G Cipher in Mobile Systems KF Jasim, IF Al-Shaikhli
International Journal on Perceptive and Cognitive Computing 2 (2), 2016
2016 Cryptography and E-mail Security HA Dawood, KF Jassim
Cihan University, First International Scientific Conference, 2014
2014 Internet and Data Security KF Jassim, HA Dawood
Advanced Computer Science and Technology Research 3 (3), 107-115, 2013
2013 Analysis a Class of Stream Ciphers QM hussein, KF Jasim
Tikrit Journal of Pure Science 17 (4), 291-295, 2012
2012