Mr. Nabeel Salih Ali
LecturerDepartment of Electronics and Communication, Faculty of Engineering, University of Kufa, Iraq
Highest Degree
Masters in Computer Science from Universiti Teknikal Malaysia Melaka, Malaysia
Share this Profile
Biography
Nabeel Salih Ali received the BSc. in computer science from University of Technology, Baghdad, Iraq, on September 2003, and the MSc. in Computer Science (Internetworking Technology) from the University Technical Malaysia Melaka (UTeM), Malaysia, on July 2015. My research works in Web Applications Security Techniques to improve the security and survivability of computer systems. In addition, Healthcare Monitoring Systems, Internet of Things (IoT).
Area of Interest:
Selected Publications
- Kadhim, M.F., A. Al-Janabi, A.H. Alhilali and N.S. Ali, 2022. Security approach for instant messaging applications: Viber as a case study. Indones. J. Electr. Eng. Comput. Sci., 26: 1109-1115.
CrossRef | Direct Link | - Alyasseri, Z.A.A., O.A. Alomari, S.N. Makhadmeh, S. Mirjalili and M.A. Al-Betar et al., 2022. EEG channel selection for person identification using binary grey wolf optimizer. IEEE Access, 10: 10500-10513.
CrossRef | Direct Link | - Alethary, A.A., A.H. Aliwy and N.S. Ali, 2022. Automated arabic-arabic sign language translation system based on 3D avatar technology. Int. J. Adv. Appl. Sci., 11: 383-396.
CrossRef | Direct Link | - Sharba, M.R.R., H.A. Kadhim, S.A.W. Al-Abassi and N.S. Ali, 2020. Online geocode in postal address using GPS with synchronous database accessing. Indones. J. Electr. Eng. Comput. Sci., 17: 1487-1492.
CrossRef | Direct Link | - Anssari, O.M., E.A. Alkaldy, N. Almudhaffar, A.N. AlTaee and N.S. Ali, 2020. A feasibility study of electrical energy generation from municipal solid waste in Iraq: Najaf case study. Int. J. Electr. Comput. Eng., 10: 3403-3411.
CrossRef | Direct Link | - Al-Mhiqani, M.N., R. Ahmad, Z.Z. Abidin, W. Yassin and A. Hassan et al., 2020. A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations. Appl. Sci., Vol. 10. 10.3390/app10155208.
CrossRef | Direct Link | - Al Farawn, A., H.D. Rjeib, N.S. Ali and B. Al-Sadawi, 2020. Secured e-payment system based on automated authentication data and iterated salted hash algorithm. TELKOMNIKA Telecommun. Comput. Electron. Control, 18: 538-544.
CrossRef | Direct Link | - Kadhim, H.A., N.S. Ali and D.M. Abdulsahib, 2019. Management and archiving system for metal detection robot using wireless-based technology and online database registry. Int. J. Power Electron. Drive Syst., 10: 219-229.
CrossRef | Direct Link | - Alhilali, A.H., N.S. Ali, M.F. Kadhim, B. Al-Sadawi and H. Alsharqi, 2019. Multi-objective attendance and management information system using computer application in industry strip. Indones. J. Electr. Eng. Comput. Sci., 16: 371-381.
CrossRef | Direct Link | - Alharan, A.F.H., H.K. Fatlawi and N.S. Ali, 2019. A cluster-based feature selection method for image texture classification. Indones. J. Electr. Eng. Comput. Sci., 14: 1433-1442.
CrossRef | Direct Link | - Alharan, A.F.H., H.K. Fatlawi and N.S. Ali, 2019. A cluster-based feature selection method for image texture classification. Indones. J. Electr. Eng. Comput. Sci., 14: 1433-1442.
CrossRef | Direct Link | - Alathari, B., M.F. Kadhim, S. Al-Khammasi and N.S. Ali, 2019. A framework implementation of surveillance tracking system based on PIR motion sensors. Indones. J. Electr. Eng. Comput. Sci., 13: 235-242.
CrossRef | Direct Link | - Al-Sakafi, L.Z., Z.M.S. Al-Hamami and N.S. Ali, 2019. Critical evaluation on the importance of aspects regarding human resource development for organization strip. TEM J., 8: 1492-1498.
Direct Link | - Al Mhiqani, M.N., R. Ahmad, Z.Z. Abidin, N.S. Ali and K.H. Abdulkareem, 2019. Review of cyber attacks classifications and threats analysis in cyber-physical systems. Int. J. Internet Technol. Secured Trans., 9: 282-298.
CrossRef | Direct Link | - Abdulkareem, K.H., M.A. Mohammed, S.S. Gunasekaran, M.N. Al-Mhiqani and A.A. Mutlag et al., 2019. A review of fog computing and machine learning: Concepts, applications, challenges and open issues. IEEE Access, 7: 153123-153140.
CrossRef | Direct Link | - Rjeib, H.D., N.S. Ali, A. Al Farawn, B. Al-Sadawi and H. Alsharqi, 2018. Attendance and information system using RFID and web-based application for academic sector. Int. J. Adv. Comput. Sci. Applic., 9: 266-274.
- Kadhim, M.F., N.S. Ali and S. Al-Khammasi, 2018. Multi-phase methodology for proposing a high performance switched campus network: University of Kufa case study. J. Eng. Applied Sci., 13: 6700-6707.
- Ali, N.S., Z.A.A. Alyasseri and A. Abdulmohson, 2018. Real-time heart pulse monitoring technique using wireless sensor network and mobile application. Int. J. Electr. Comput. Eng., 10.11591/ijece.v8i6.pp5118-5126.
CrossRef | Direct Link | - Ali, N.S., 2018. Investigation framework of web applications vulnerabilities, attacks and protection techniques in structured query language injection attacks. Int. J. Wireless Mobile Comput., 14: 103-122.
CrossRef | Direct Link | - Alattar, M.H., A.A. Farawn and N.S. Ali, 2018. Anti-continuous collisions user-based unpredictable iterative password salted hash encryption. Int. J. Internet Technol. Secured Trans., 8: 619-634.
CrossRef | Direct Link | - Al-Mhiqani, M.N., R. Ahmad, Z.Z. Abidin, N.S. Ali and K.H. Abdulkareem, 2018. Review of cyber attacks classifications and threats analysis in cyber-physical systems. Int. J. Internet Technol. Secured Trans. (In Press). .
- Al-Mhiqani, M.N., R. Ahmad, W. Yassin, A. Hassan, Z.Z. Abidin, N.S. Ali and K.H. Abdulkareem, 2018. Cyber-security incidents: A review cases in cyber-physical systems. Int. J. Adv. Comput. Sci. Applic., 9: 499-508.
- Abdulmohson, A., N.S. Ali and Z.A.A. Alyasseri, 2018. A comparative study between the internal and external internet broadcasting on Al-Najaf city. Int. J. Comput. Applic., 179: 31-33.
- Abdulkareem, K.H., M.S. Azmi, N.S. Ali, M.N. Al-Mhiqani and H. Alsharqi, 2018. Systematic phases for proposing a new model of qualifications gap based on network technician data. J. Soft Comput. Decision Support Syst., 5: 27-35.
Direct Link | - Ali, N.S. and Z.A.A. Alyasseri, 2017. Wireless sensor network and web application hybrid scheme for healthcare monitoring. J. Soft Comput. Decision Support Syst., 4: 1-7.
Direct Link | - Ali, N.S. and M. Nasser, 2017. Review of virtual reality trends (previous, current and future directions) and their applications, technologies and technical issues. ARPN J. Eng. Appl. Sci., 12: 783-789.
Direct Link | - Al-Mhiqani, M.N., R. Ahmad, K.H. Abdulkareem and N.S. Ali, 2017. Investigation study of cyber-physical systems: Characteristics, application domains and security challenges. ARPN J. Eng. Applied Sci., 12: 6557-6567.
- Ali, N.S., 2016. A four-phase methodology for protecting web applications using an effective real-time technique. Int. J. Internet Technol. Secured Trans., 6: 303-323.
CrossRef | Direct Link | - Ali, N.S. and A.S. Shibghatullah, 2016. Protection Web Applications Using Real-Time Technique To Detect Structured Query Language Injection Attacks. Int. J. Comput. Appli., 149: 26-32.
- Abdulkareem, K.H., M.S. Azmi, N.S. Ali and M. Nasser, 2016. Factors Affecting Qualifications Gap For Network Technicians: Baghdad Universities Case Study. Int. J. Recent Trends Eng. Res., 2: 5-11.
Direct Link | - Ali, N.S., A.S. Shibghatullah and M.H. Al Attar, 2015. Review of the defensive approaches for structured query language injection attacks and their countermeasures. J. Theoret. Applied Inform. Technol., 2076: 258-269.
Direct Link |