Themes by Openjournaltheme.com
Novelty OJS 3 Theme by openjournaltheme.com theme
Quick jump to page content
Main Navigation
Main Content
Sidebar
Register
Login
Online ISSN : 2617-6548
Toggle navigation
Home
Current
Archives
Announcements
About
About the Journal
Peer Review Policy
Submissions
Editorial Team
Privacy Statement
Search
Search
Search articles for
Advanced filters
Published After
2018
2019
2020
2021
2022
2023
2024
2025
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
Published Before
2018
2019
2020
2021
2022
2023
2024
2025
January
February
March
April
May
June
July
August
September
October
November
December
01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
By Author
Search Results
Engineering
KTCGM: Towards A novel solution for enhancing Kerberos-5 with threshold cryptography and ML-based anomaly detection
Rami Almatarneh, Mohammad Aljaidi, Ayoub Alsarhan, Sami Aziz Alshammari, Nayef H. Alshammari
3646-3662
Abstract View : 50
Download :14
10.53894/ijirss.v8i3.7328
Minimizing overhead using efficient PUF-based authentication in flying ad hoc networks
Nazik K. Aljbur, Mohammed Yousif, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, Mansour Obeida
4123-4136
Abstract View : 102
Download :37
10.53894/ijirss.v8i2.6246
Engineering
Lightweight and quantum-resistant authentication for the Internet of Drones (IoD) using Dilithium signatures.
Nawar Hayder Tawfeeq, Mohammed Yousif, Mahmood A Al-Shareeda, Mohammed Amin Almaiah, Rami...
2842-2853
Abstract View : 154
Download :55
10.53894/ijirss.v8i2.5825
Dynamic key revocation and hybrid cryptographic approaches for secure authentication in the social internet of vehicles
Muhammad N. Jawad, Mahmood A. Al-Shareeda, Omar Yawez Mustafa Mustafa, Mohammed Amin Almaiah,...
3135-3151
Abstract View : 116
Download :87
10.53894/ijirss.v8i2.5956
Engineering
Securing cross-domain authentication in vehicular ad hoc networks
Abdulaziz Zaid A Aljarwan, Md Asri Bin Ngadi
2865-2879
Abstract View : 187
Download :100
10.53894/ijirss.v8i2.5828
Engineering
Post-quantum secure anonymous authentication for smart cities
Ali Hamzah Obaid, Khansaa Azeez Obayes Al-Husseini, Mahmood A. Al-Shareeda, Mohammed Amin...
4315-4324
Abstract View : 96
Download :33
10.53894/ijirss.v8i3.7506
OTP security in wallet systems: A vulnerability assessment
Ahmad H. Al-Omari, Ahmad Ghazi Alshanty, Ayoub Alsarhan, Saifullah A. Omari
2356-2371
Abstract View : 172
Download :64
10.53894/ijirss.v8i2.5691
Social Sciences
Data security in digital accounting: A logistic regression analysis of risk factors
Anber Abraheem Shlash Mohammad, Suleiman Ibrahim Shelash Mohammad, Badrea Al Oraini, Asokan...
2699-2709
Abstract View : 147
Download :93
10.53894/ijirss.v8i1.5044
A lightweight CNN architecture integrating gradient and pore features for high-precision fingerprint spoof detection with visual explainability
Anusha M. S, Mamatha G
3322-3333
Abstract View : 33
Download :15
10.53894/ijirss.v8i3.7231
An integrated AI-blockchain framework for securing web applications, mitigating SQL injection, model poisoning, and IoT spoofing attacks
Rami Almatarneh, Mohammad Aljaidi, Ayoub Alsarhan, Sami Aziz Alshammari, Fahd Alhamazani,...
2759-2773
Abstract View : 73
Download :36
10.53894/ijirss.v8i3.7077
Main framework for developing Sharia economic Fiqh: A contemporary Islamic law reform perspective
Syafaul Mudawam
2282-2291
Abstract View : 126
Download :29
10.53894/ijirss.v8i3.6984
Social Sciences
An ensemble model for improving the accuracy and security of biometric identification
Lyailya Cherikbayeva, Matkerim Bazargul, Dauren Darkenbayev, Nurbolat Tasbolatuly, Zhanetta...
105-114
Abstract View : 200
Download :110
10.53894/ijirss.v8i3.6439
CSAS-V: Certificateless Schnorr Aggregate Signature for VANETs
May Adnan Faleh, Mohammed Yousif, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, Mansour...
4000-4011
Abstract View : 122
Download :50
10.53894/ijirss.v8i2.6200
Evaluating elliptic curve cryptography in constrained environments: A Raspberry Pi-based approach
Murtaja Ali Saare, Muhammad N. Jawad, Mahmood A. Al-Shareeda, Mohammed Amin Almaiah, Mansour...
3966-3976
Abstract View : 128
Download :43
10.53894/ijirss.v8i2.6195
Developing A theoretical model for adoption of facial recognition payment for senior citizens in Tangshan City, Hebei, China
Yuhan Zhou, Abdul Manaf Bohari
1102-1111
Abstract View : 49
Download :60
10.53894/ijirss.v8i3.6760
Engineering
Integration of El-Gamal cryptosystem and AI to enhance cyber defence
Zhanerke Temirbekova, Rat Berdibayev, Sakhybay Tynymbayev, Alimzhan Baikenov, Guldiana...
DOI record not available
507-515
Abstract View : 33
Download :8
Engineering
NOVA: A hybrid detection framework for misbehavior in vehicular networks
Afrah Abood Abdul Kadhim Kadhim, Zainab Marid Alzamili, Mahmood A Al-Shareeda, Mohammed Amin...
1611-1624
Abstract View : 90
Download :66
10.53894/ijirss.v8i2.5521
1 - 17 of 17 items
Themes by Openjournaltheme.com
gsCitation
All
Since 2020
Citations
709
689
h-index
11
11
i10-index
14
14
0
200
100
50
150
2019
2020
2021
2022
2023
2024
2025
9
23
70
187
135
174
97