Researches and Papers
1. "A Proposed Method to Hide Text Inside HTML Web Page File", Computer Researches Magazine, No.2, Vol.7, 2003, Arab Federation for Research Councils, Baghdad, Iraq.
2. "Information Hiding in ICMP Messages", Magazine of Al-RafidainUniversity Collegefor Science, No. 15, 2004. Baghdad, Iraq.
3. "A Proposed Method to Detect Hidden Information in Image", Magazine of Al-Rafidain university college for Science, No. 14, 2004. Baghdad, Iraq.
4. "Extract the Hidden Information in Image", Magazine of Al-Rafidain University Collegefor Science, No. 14, 2004. Baghdad, Iraq.
5. "Image Steganalysis Distortion", Magazine of Al-RafidainUniversity Collegefor Science, No. 15, 2004. Baghdad, Iraq.
6. "Improving Performance and Random Signature Schemes in Twofish Cryptosystem", Magazine of Al- Rafidain University College for Science, No. 16, 2005. Baghdad, Iraq.
7. "A Proposal for a New Method in Subliminary Channel Usage", Magazine of Al-Rafidain University Collegefor Science, No. 16, 2005. Baghdad, Iraq.
8. "Applying Data Mining Techniques in Intrusion Detection System on Web and Analysis of Web Usage", Information Technology Journal, Asian Network for Scientific Information, Vol. 5, No. 1, P: 57-63, 2006, Pakistan.
9. "A Proposed Firewall for Viruses", Magazine of Al-Rafidain University College for Science, No. 20, 2007. Baghdad, Iraq.
10. “Using Data Mining Confidence and Support for Privacy Preserving Secure Database”, Journal of Statistical Sciences, Volume 1, No. 1, Issued by Arab Institute for Training and Research in Statistics, July –December 2009.
11. "A Novel Strategy to Provide Secure Channel over Wireless to Wire Communication",Ubiquitous Computing and Communication Journal, Volume 4, No.3, 15/8/2009, http://www.ubicc.org/journal_full_detail.aspx?id=29.
12. "A strategy to Compromise Handwritten Documents Processing and Retrieving Using Association Rules Mining",Ubiquitous Computing and Communication Journal, Volume 6, No. 3, 15/6/2011. http://www.ubicc.org/journal_detail.aspx?id=48
13. "A proposed Modified Data Encryption Standard algorithm by Using Fusing Data Technique", World of Computer Science and Information Technology Journal (WCSIT), ISSN: 2221-0741, Vol. 1, No. 3, 88-91, 2011, http://pub.wcsit.org/1.3.2011.88.91.
14. "Developing a Block-Cipher-Key Generator Using Philosophy of Data Fusion Technique",Journal of Emerging Trends in Computing and Information Sciences, Volume 2 No.5, MAY 2011, ISSN 2079-8407, http://www.cisjournal.org/Archive_May_2011.aspx.
15. "A Proposed Anti-viruses Strategy for a Complex Environment with a Huge Number of Viruses Attacks",Journal of Emerging Trends in Computing and Information Sciences, Volume 2 No.6, JUNE 2011, ISSN 2079-8407, http://www.cisjournal.org/journalofcomputing/Archive_June_2011.aspx
2. "Information Hiding in ICMP Messages", Magazine of Al-RafidainUniversity Collegefor Science, No. 15, 2004. Baghdad, Iraq.
3. "A Proposed Method to Detect Hidden Information in Image", Magazine of Al-Rafidain university college for Science, No. 14, 2004. Baghdad, Iraq.
4. "Extract the Hidden Information in Image", Magazine of Al-Rafidain University Collegefor Science, No. 14, 2004. Baghdad, Iraq.
5. "Image Steganalysis Distortion", Magazine of Al-RafidainUniversity Collegefor Science, No. 15, 2004. Baghdad, Iraq.
6. "Improving Performance and Random Signature Schemes in Twofish Cryptosystem", Magazine of Al- Rafidain University College for Science, No. 16, 2005. Baghdad, Iraq.
7. "A Proposal for a New Method in Subliminary Channel Usage", Magazine of Al-Rafidain University Collegefor Science, No. 16, 2005. Baghdad, Iraq.
8. "Applying Data Mining Techniques in Intrusion Detection System on Web and Analysis of Web Usage", Information Technology Journal, Asian Network for Scientific Information, Vol. 5, No. 1, P: 57-63, 2006, Pakistan.
9. "A Proposed Firewall for Viruses", Magazine of Al-Rafidain University College for Science, No. 20, 2007. Baghdad, Iraq.
10. “Using Data Mining Confidence and Support for Privacy Preserving Secure Database”, Journal of Statistical Sciences, Volume 1, No. 1, Issued by Arab Institute for Training and Research in Statistics, July –December 2009.
11. "A Novel Strategy to Provide Secure Channel over Wireless to Wire Communication",Ubiquitous Computing and Communication Journal, Volume 4, No.3, 15/8/2009, http://www.ubicc.org/journal_full_detail.aspx?id=29.
12. "A strategy to Compromise Handwritten Documents Processing and Retrieving Using Association Rules Mining",Ubiquitous Computing and Communication Journal, Volume 6, No. 3, 15/6/2011. http://www.ubicc.org/journal_detail.aspx?id=48
13. "A proposed Modified Data Encryption Standard algorithm by Using Fusing Data Technique", World of Computer Science and Information Technology Journal (WCSIT), ISSN: 2221-0741, Vol. 1, No. 3, 88-91, 2011, http://pub.wcsit.org/1.3.2011.88.91.
14. "Developing a Block-Cipher-Key Generator Using Philosophy of Data Fusion Technique",Journal of Emerging Trends in Computing and Information Sciences, Volume 2 No.5, MAY 2011, ISSN 2079-8407, http://www.cisjournal.org/Archive_May_2011.aspx.
15. "A Proposed Anti-viruses Strategy for a Complex Environment with a Huge Number of Viruses Attacks",Journal of Emerging Trends in Computing and Information Sciences, Volume 2 No.6, JUNE 2011, ISSN 2079-8407, http://www.cisjournal.org/journalofcomputing/Archive_June_2011.aspx