Most Popular Papers*
Blockchain-Technology-Based Solutions for IOT Security
Israa Al-Barazanchi, Aparna Murthy, Ahmad Abdul Qadir Al Rababah, Ghadeer Khader, Haider Rasheed Abdulshaheed, Hafiz Tayyab Rauf, Elika Daghighi, and Yitong Niu
Resource Allocation and Edge Computing for Dual Hop Communication in Satellite Assisted UAVs enabled VANETs
Ahmed Adil Nafea, Mustafa Maad Hamdi, and Sami Abduljabbar Rashid
Arabic Chatbots Challenges and Solutions: A Systematic Literature Review
Soufiyan Ouali and Said El Garouani
Rao-SVM Machine Learning Algorithm for Intrusion Detection System
Shamis N. Abd, Mohammad Alsajri, and Hind Raad Ibraheem
Detecting Data Poisoning Attacks in Federated Learning for Healthcare Applications Using Deep Learning
Mohammed Aljanabi, Alaa Hamza Omran, and Sahar Yousif Mohammed
Vertex and region colourings of planar idempotent divisor graphsof commutative rings.
Mohammed N. Authman, Husam Q. Mohammad, and Nazar H. Shuker
A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech
Guma Ali, Maad M. Mijwil, Bosco Apparatus Buruga, and Mostafa Abotaleb
A Review of the Integration Between Geospatial Artificial Intelligence and Remote Sensing
Abeer A. Mohamad Alshiha
Rad-Quasi-Prime Submodules
Rana NooriMajeed, Ghaleb Ahmed Hammood, Mahmood S. Fiadh, and Lemya Abd Alameer Hadi
* Based on the average number of full-text downloads per day since the paper was posted.