Conferences
1. "Image Steganalysis Using Statistical Methods", Second National Conference on Computer, March, 2003, Iraqi Committee for Computer and Information, Baghdad, Iraq.
2. "Building Immune Web Against Steganographic Image", the 3rd International Conference on Information and Communication Technology (ICICT2005), Cairo, Egypt, December 2005.
3. "A Proposed Modifications to Improve the Performance of Blowfish Cryptography Algorithm", First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh, Kingdom of Saudi Arabia, 5-7 Feb 2006.
4. "Techniques for Fast and Efficient Retrieving Images from an Image Database", First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh, Kingdom of Saudi Arabia, 5-7 Feb 2006.
5. "Adding New Level in KDD to Make the Web Using Mining More Efficient", First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh, Kingdom of Saudi Arabia, 5-7 Feb 2006.
6. "Applying Data Mining Techniques to Discover Methods that Used for Hiding Messages Inside Images", the IEEE first International Conference on Digital Information Management (ICDIM2006), Bangalore, India, 2006.
7. "Using Image Mining to Discover Association Rules between Image Objects", the 2nd Jordan International Conference on Computer Science and Engineering, JICCSE, Al- Balqa Applied University, Salt, Jordan, 2006.
8. "Extending the Ability of Mobile Devices to Use Wavelet-based Watermarking and Steganography Applications", the 2nd Jordan International Conference on Computer Science and Engineering, JICCSE, Al-Balqa Applied University, Salt, Jordan, 2006.
9. "A Proposed System to Build a Covert Channel Using Java Applet", the 2nd Jordan International Conference on Computer Science and Engineering, JICCSE, Al-Balqa Applied University, Salt, Jordan, 2006.
10. "A Method for Attacking a Protected Site by a Clean Intruder", the 1st International Conference on Digital Communications and Computer Applications (DCCA2007), the Jordan University of Science and Technology, Irbid, Jordan. 2007.
11. "A Proposed System to Improve Relevant Information Retrieval on the Web", the 1st International Conference on Digital Communications and Computer Applications (DCCA2007), the Jordan University of Science and Technology, Irbid, Jordan.2007.
12. "Enabling 24-Colored Images for Mining", WORLD Comp’07, the 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, USA, 2007.
13. "Enhance Traditional Search Engines for Efficient Images Searching", the International Arab Conference on Information Technology (ACIT'2007), November 26-28, 2007, Syria.
14. "Using Data Mining Technique (MAFIA) on Suggested Stego Database for Improving Staganography Usage", WORLD Comp’ 08, the 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, USA, 2008.
15. "Apprpach to Protect Internet Servers from Unauthorized Usage of MobileDevices", the Fourth International Workshop on Advanced Computation for Engineering Applications (ACEA08) Al-Balqa Applied University, Salt, Jordan \ July 23-24, 2008.
16. "A Proposed Technique for Medical Diagnosis Using Data Mining", the International Conference on Intelligent Computing and Information Systems, CICIS, Ain Shams University,Cairo, Egypt, March 19-22, 2009.
17. "Applying Packets Meta data for Web Usage Mining", Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009), 15 - 17 December 2009, Philadelphia University, Amman, Jordan, http://www.bcs.org/server.php?show=conWebDoc.33746.
18. "The Security Awareness of Social Networking Sites Usage", Social Media Masters Conference, 12-13 September 2012, Manama, Kingdom of Bahrain.
19. "eCommerce Security", Sixth Gulf eCommerce Forum, 18-19 december 2012, Manama, Kingdom of Bahrain.
20. "Using Social Media for Organizations", First Gulf Conference for Volunteer Work, 29-30 April 2013.
2. "Building Immune Web Against Steganographic Image", the 3rd International Conference on Information and Communication Technology (ICICT2005), Cairo, Egypt, December 2005.
3. "A Proposed Modifications to Improve the Performance of Blowfish Cryptography Algorithm", First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh, Kingdom of Saudi Arabia, 5-7 Feb 2006.
4. "Techniques for Fast and Efficient Retrieving Images from an Image Database", First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh, Kingdom of Saudi Arabia, 5-7 Feb 2006.
5. "Adding New Level in KDD to Make the Web Using Mining More Efficient", First National Information Technology Symposium (NITS 2006) Bridging the Digital Divide: Challenge and Solutions, King Saud University, Riyadh, Kingdom of Saudi Arabia, 5-7 Feb 2006.
6. "Applying Data Mining Techniques to Discover Methods that Used for Hiding Messages Inside Images", the IEEE first International Conference on Digital Information Management (ICDIM2006), Bangalore, India, 2006.
7. "Using Image Mining to Discover Association Rules between Image Objects", the 2nd Jordan International Conference on Computer Science and Engineering, JICCSE, Al- Balqa Applied University, Salt, Jordan, 2006.
8. "Extending the Ability of Mobile Devices to Use Wavelet-based Watermarking and Steganography Applications", the 2nd Jordan International Conference on Computer Science and Engineering, JICCSE, Al-Balqa Applied University, Salt, Jordan, 2006.
9. "A Proposed System to Build a Covert Channel Using Java Applet", the 2nd Jordan International Conference on Computer Science and Engineering, JICCSE, Al-Balqa Applied University, Salt, Jordan, 2006.
10. "A Method for Attacking a Protected Site by a Clean Intruder", the 1st International Conference on Digital Communications and Computer Applications (DCCA2007), the Jordan University of Science and Technology, Irbid, Jordan. 2007.
11. "A Proposed System to Improve Relevant Information Retrieval on the Web", the 1st International Conference on Digital Communications and Computer Applications (DCCA2007), the Jordan University of Science and Technology, Irbid, Jordan.2007.
12. "Enabling 24-Colored Images for Mining", WORLD Comp’07, the 2007 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, USA, 2007.
13. "Enhance Traditional Search Engines for Efficient Images Searching", the International Arab Conference on Information Technology (ACIT'2007), November 26-28, 2007, Syria.
14. "Using Data Mining Technique (MAFIA) on Suggested Stego Database for Improving Staganography Usage", WORLD Comp’ 08, the 2008 World Congress in Computer Science, Computer Engineering, and Applied Computing, Las Vegas, USA, 2008.
15. "Apprpach to Protect Internet Servers from Unauthorized Usage of MobileDevices", the Fourth International Workshop on Advanced Computation for Engineering Applications (ACEA08) Al-Balqa Applied University, Salt, Jordan \ July 23-24, 2008.
16. "A Proposed Technique for Medical Diagnosis Using Data Mining", the International Conference on Intelligent Computing and Information Systems, CICIS, Ain Shams University,Cairo, Egypt, March 19-22, 2009.
17. "Applying Packets Meta data for Web Usage Mining", Third International Symposium on Innovation and Information and Communication Technology (ISIICT 2009), 15 - 17 December 2009, Philadelphia University, Amman, Jordan, http://www.bcs.org/server.php?show=conWebDoc.33746.
18. "The Security Awareness of Social Networking Sites Usage", Social Media Masters Conference, 12-13 September 2012, Manama, Kingdom of Bahrain.
19. "eCommerce Security", Sixth Gulf eCommerce Forum, 18-19 december 2012, Manama, Kingdom of Bahrain.
20. "Using Social Media for Organizations", First Gulf Conference for Volunteer Work, 29-30 April 2013.