| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Int. J. Wirel. Mob. Comput.
|
| 2024 | J | jnl |
Digit. Soc.
|
| 2023 | J | jnl |
J. Real Time Image Process.
|
| 2023 | J | jnl |
Int. J. Inf. Comput. Secur.
|
| 2022 | J | jnl |
J. King Saud Univ. Comput. Inf. Sci.
|
| 2022 | J | jnl |
J. Ambient Intell. Humaniz. Comput.
|
| 2021 | J | jnl |
Webology
|
| 2020 | J | jnl |
IEEE Internet Things J.
|
| 2019 | J | jnl |
Symmetry
|
| 2019 | J | jnl |
Clust. Comput.
|
| 2019 | — | conf |
ACIIDS (Extended Posters)
|
| 2019 | J | jnl |
Comput. Electr. Eng.
|
| 2017 | J | jnl |
Int. J. Commun. Syst.
|
| 2017 | J | jnl |
Int. J. Commun. Networks Distributed Syst.
|
| 2017 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2015 | J | jnl |
J. Intell. Fuzzy Syst.
|
| 2014 | J | jnl |
Int. J. Commun. Syst.
|
| 2012 | C | conf |
SQLStor: Blockage of stored procedure SQL injection attack using dynamic query structure validation.
ISDA
|