Khalil Al Dulaimi, Layth A
14  Ergebnisse:
Personensuche X
?
3

Performance analysis of 2-D MDW OCDMA code with NRZ and RZ ..:

, In: 2016 3rd International Conference on Electronic Design (ICED),
 
?
4

Behavioral and performance jellyfish attack:

Al Dulaimi, Layth A. Khalil ; Ahmad, R. Badlishah ; Yaakob, Naimah..
Indonesian Journal of Electrical Engineering and Computer Science.  13 (2019)  2 - p. 683 , 2019
 
?
5

Black hole attack behavioral analysis general network scala..:

Al Dulaimi, Layth A. Khalil ; Ahmad, R. Badlishah ; Yaakob, Naimah..
Indonesian Journal of Electrical Engineering and Computer Science.  13 (2019)  2 - p. 677 , 2019
 
?
10

Behavioral and performance jellyfish attack:

Al Dulaimi, Layth A. Khalil ; Ahmad, R. Badlishah ; Yaakob, Naimah..
https://ijeecs.iaescore.com/index.php/IJEECS/article/view/16721/10510.  , 2019
 
?
 
?
 
?
14

Review of Security and Privacy Scheme for Vehicular Ad Hoc ..:

Al-dulaimi, Israa M. ; Khalil, Ayman
International Journal of Engineering and Management Research e-ISSN: 2250-0758 | p-ISSN: 2394-6962 Volume-10, Issue-5 (October 2020).  , 2020
 
1-14