A.S. Abdulbaqi, A.A. Abdulhameed and A.J. Obaid, Cardiopathy symptoms diagnosis based on a secure real-time
ECG signal transmission, Int. J. Nonlinear Anal. and Appl. 12(2) (2021) 1353–1370.
 A.S. Abdulbaqi and R.H. Mahdi, Biometrics detection and recognition based-on geometrical features extraction,
In 2018 Int. Conf. Adv. Sustainable Engin. Appl. IEEE, (2018) 59–63.
 A.S. Abdulbaqi, A.J. Obaid and A.H. Mohammed, ECG signals recruitment to implement a new technique for
medical image encryption, J. Discrete Math. Sci. Crypt. (2021) 1–11.
 J.M. Beaver, C.T. Symons, R.E. Gillen, A learning system for discriminating variants of malicious network traffic,
8th Annual Cyber Security and Information Intelligence Research Workshop, (2012) pp. 1–4.
 D.S.A. Elminaam, H.M.K. Abdual and M.M. Hadhoud, Evaluating the performance of symmetric encryption
algorithms, Int. J. Network Secur. 10(3) (2010) 216–222.
 N. Gura, A. Patel, A. Wander, H. Eberle and S.C. Shantz, Comparing elliptic curve cryptography and RSA on
8-bit CPUs, M. Joye and J.J. Quisquater (eds), Cryptographic Hardware and Embedded Systems - CHES 2004,
3156 (2004) 119–132.
 A. Khalique, K. Singh and S. Sood, A password-authenticated key agreement scheme based on ECC using smart
cards, Int. J. Comput. Appl. 2(3) (2010) 26–30.
 G. Lakshmi, M. Ghonge and A.J. Obaid, Cloud Based IoT Smart Healthcare System for Remote Patient Monitoring, EAI Endorsed Transactions on Pervasive Health and Technology, 2021.
 P. Mell and T. Grance, The NIST Definition of Cloud Computing, Computer Security Division, Inf. Tech. Lab.
Nat. Inst. Stand. Tech. 800(145) (2011).
 J. Owens and J. Matthews, A study of passwords and methods used in brute-force SSH attacks, USENIX Workshop
on Large Scale Exploits and Emergent Threats (LEET), 2008.
 R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems,
Commun. ACM Magazine 21(2) (1978) 120–126.
 S.P. Singh and R. Maini, Comparison of data encryption algorithms, Int. J. Comput. Sci. Commun. 2(1) (2011)
 M. Strebe, Network Security Foundations: Technology Fundamentals for IT Success, Wiley, 2004.