Multi-Level Windows Exploitation Using Linux Operating System AAK Abdulrahman Asian Journal of Natural & Applied Sciences 5, 2, 2016 | 4 | 2016 |
Protect sensitive knowledge in data mining clustering algorithm AK Jumaa, AA Abudalrahman, RR Aziz, AA Shaltooki Journal of Theoretical and Applied Information Technology 95 (15), 3422-3431, 2017 | 2 | 2017 |
Continuous proteretic hopfield neural network in walsh-based distributed storage AA Abdulrahman Passer Journal of Basic and Applied Sciences 4 (Special issue), 92-106, 2022 | 1 | 2022 |
Design and Implementation of Private SMS Using GPRS AA Abdulrahman | | 2016 |
Design and Implement Privet Chatting Over Bluetooth for Wide Area K H Shareef, A A Abdulrahman, A F Fadhil Kirkuk Journal of Science 11 (1), 167-184, 2016 | | 2016 |
Exploitnig DNS Server Vulnerabilites Using Linux Operating System AA Abdulrahman, AK Jumaa INTERNATIONAL JOURNAL 15 (9), 0 | | |
Mineral Exploation Using Neural Netowrks AA Abdulrahman INTERNATIONAL JOURNAL 15 (9), 0 | | |