| Research Title | MAG. TITLE | RESEARCH AREA | PUBLISH YEAR | DOI | Journal URL | 
			| Deep Learning Framework for Advanced De-Identification of Protected Health Information | Future Internet | protected health information; electronic health record; deep learning; de-identification; Bi-LSTM-CRF | 2025 |  | Visit URL | 
			| Supervised Machine Learning for Real-Time Intrusion Attack Detection in Connected and Autonomous Vehicles: A Security Paradigm Shift | Informatics | autonomous vehicles; vehicle security; intrusion detection; connected vehicles; cyber security; machine-learning; smart city | 2025 |  | Visit URL | 
			| Fraud in Online Classified Ads: Strategies, Risks, and Detection Methods: A Survey | Journal of Applied Security Research | Cybersecurity | 2022 |  | Visit URL | 
			| A hybrid Secure Watermarking Scheme Using Nonnegative Matrix Factorization and Fast Walsh-Hadamard Transform | Journal of Applied Security Research | Information System Security | 2019 |  | Visit URL | 
			| A new digital signature scheme with message recovery using hybrid problems, | International Journal of Electrical and Computer Engineering (IJECE), | Information System Security | 2019 |  | Visit URL | 
			| Feature-based Sentiment Analysis for Slang Arabic Text | International Journal of Advanced Computer Science and Applications | Information System | 2019 |  | Visit URL | 
			| Automated labelling and severity prediction of software bug reports | International Journal of Computational Science and Engineering | Pattern Recognition | 2018 |  | Visit URL | 
			| Hybrid Publicly Verifiable Authenticated Encryption Scheme based on Chaotic Maps and Factoring Problems | Journal of Applied Security Research, | Information System Security | 2018 |  | Visit URL | 
			| Blind Users Assistive Technology Based on the Android Platform | International Journal of Innovative Computing and Applications (IJICA), | Information System | 2017 |  | Visit URL | 
			| Local Patterns for Offline Arabic Handwritten Recognition | International Journal of Advanced Intelligence Paradigms | Pattern Recognition | 2017 |  | Visit URL | 
			| A Proxy Partially Blind Signature Approach Using Elliptic Curve Cryptosystem | International Journal of Mathematics in Operational Research | Information System Security | 2016 |  | Visit URL | 
			| Randomized Geographic-based Routing with Nearly Guaranteed Delivery for 3D Ad Hoc Network | International Journal of Distributed Sensor Networks | Network | 2016 |  | Visit URL | 
			| A Blind 3D Watermarking Technique Using Spherical Coordinates and Skewness Measure | International Journal of Security and networks | Security | 2015 |  | Visit URL | 
			| An Index-Based Approach for Wireless Sensor Networks | Journal of Wireless Personal Communications, | Network | 2015 |  | Visit URL | 
			| Breast Cancer Classification Comparative Performance Analysis of Image Shape-Based Features and Microarray Gene Expression Data | International Journal of Bio-Science and Bio-Technology, | Pattern Recognition | 2015 |  | Visit URL | 
			| Effective Diagnosis and Monitoring of Heart Disease," | International Journal of Software Engineering and Its Applications, | Pattern Recognition | 2015 |  | Visit URL | 
			| Power Aware Ant Colony Routing Algorithm for Mobile Ad-hoc Networks | International Journal of Software Engineering and its Applications, | Network | 2015 |  | Visit URL | 
			| A New signing algorithm based on elliptic curve discrete logarithms and quadratic residue problems | Italian Journal of Pure and Applied Mathematics, | Security | 2014 |  | Visit URL | 
			| An Intelligent System for Author Attribution Based on a Hybrid Feature Set | International Journal of Advanced Inelligence Paradigms, | Pattern Recognition | 2014 |  | Visit URL | 
			| Cluster-Based Online Routing Protocols for Ad Hoc Network | International Journal of Information Technology and Web Engineering, | Network | 2014 |  | Visit URL | 
			| Spectral Graph and Minimal Spanning Tree for 3D Polygonal Meshes Fingerprinting | International Journal of Information Technology and Web Engineering | Security | 2014 |  | Visit URL | 
			| An Economic Model for Resource Adaptation in 2D Mesh Multicomputer Networks | International Journal of Computers and Their Application | Network Security | 2013 |  | Visit URL | 
			| Secure local algorithm for establishing a virtual backbone in 3D ad hoc network | International  Journal of  Networking and Virtual Organizations | Network Security | 2013 |  | Visit URL | 
			| Simplified approach for generating integrity tests in distributed database systems | International Journal of Innovation and Learning | Database, Security | 2013 |  | Visit URL | 
			| Simplified features for email authorship identification | International Journal of Security and networks | Security | 2013 |  | Visit URL | 
			| Texture recognition by using a non-linear kernel | International Journal of Computer Applications in Technology | Pattern Recognition, Multimedia | 2013 |  | Visit URL | 
			| An energy-efficient threshold-based clustering protocol for wireless sensor networks | Journal of Wireless Personal Communications | Network | 2012 |  | Visit URL | 
			| Checking the efficiency of integrity tests in distributed and parallel database | International Journal of Business Information Systems | Database, Security | 2012 |  | Visit URL | 
			| Enhanced fast spread replication strategy for data grid | Journal of Network and Computer Applications | Network | 2011 |  | Visit URL | 
			| Video watermarking using wavelet transform and tensor algebra | Signal, Image and Video Processing, Springer Journal | Multimedia Security | 2010 |  | Visit URL | 
			| Watermarking 3D models using spectral mesh compression | Signal, Image and Video Processing, Springer Journal | Multimedia Security | 2009 |  | Visit URL | 
			| Improved image watermarking scheme using fast Hadamard and discrete wavelet transforms | Journal of Electronic Imaging | Multimedia Security | 2007 |  | Visit URL |