Sufyan T. Faraj Al-Janabi

Orcid: 0000-0002-2805-5738

According to our database1, Sufyan T. Faraj Al-Janabi authored at least 13 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Fake Colorized Image Detection Approaches: A Review.
Int. J. Image Graph., November, 2023

Fake Colorized Image Detection Based on Special Image Representation and Transfer Learning.
Int. J. Comput. Intell. Appl., September, 2023

Using Metaheuristics (SA-MCSDN) Optimized for Multi-Controller Placement in Software-Defined Networking.
Future Internet, 2023

Double Dual Convolutional Neural Network (D2CNN) for Copy-Move Forgery Detection.
Proceedings of the 15th International Conference on Developments in eSystems Engineering, 2023

2022
Valid Blockchain-Based E-Voting Using Elliptic Curve and Homomorphic Encryption.
Int. J. Interact. Mob. Technol., October, 2022

Multi-Controllers Placement Optimization in SDN by the Hybrid HSA-PSO Algorithm.
Comput., 2022

2021
Enhanced Iterated Local Search for Scheduling of Scientific Workflows.
Proceedings of the 14th International Conference on Developments in eSystems Engineering, 2021

2013
Efficient Symmetric and Heterogeneous Mobile Group-Based Key Management Protocol.
Proceedings of the Sixth International Conference on Developments in eSystems Engineering, 2013

2012
Privacy preserving distributed knowledge discovery: survey and future directions.
Int. J. Reason. based Intell. Syst., 2012

2011
A Neural Network Based Anomaly Intrusion Detection System.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Video Encryption Based on Special Huffman Coding and Rabbit Stream Cipher.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Public-Key Cryptography Enabled Kerberos Authentication.
Proceedings of the 2011 Developments in E-systems Engineering, 2011

Combining Mediated and Identity-Based Cryptography for Securing E-Mail.
Proceedings of the Digital Enterprise and Information Systems - International Conference, 2011


  Loading...