Subscribe Now Subscribe Today
Science Alert
    Publisher: Asian Network for Scientific Information
  Information Technology Journal is a scholarly, peer-reviewed journal that provides a forum to the academics, scholars and advanced level students for exchanging significant information and productive ideas associated with information technology. Scope of the journal includes: strategy, infrastructure, human resources, sourcing system development and implementation, communications, national policies and standards technology developments, technology futures, software engineering, formal methods and business process management.

Submit your best paper to this journal via online submission system.
  Editor-in-Chief:  Shakil Akhtar
Al-Saadoon, G.M.W., 2009. A flexible and reliable architecture for mobile agent security. J. Comput. Sci., 5: 270-274.
CrossRef  |  Direct Link  |  
Al-Saadoon, G.M.W., 2009. A platform to develop a secure instant messaging using jabber protocol. J. Comput. Sci., 5: 661-665.
CrossRef  |  Direct Link  |  
Al-Saadoon, G.M.W., 2009. Asterisk open source to implement voice over internet protocol. Int. J. Comput. Sci. Network Secur., 9: 39-42.
Direct Link  |  
Haris, S.H.C., G.M. Waleed, R.B. Ahmed and M.A.H.A. Gani, 2011. Anomaly detection of IP header threats. Int. J. Comput. Sci. Secur., 4: 497-504.
Direct Link  |  
Waleed Al-Saadoo, G.M., 2010. Building a distributed secure system on Multi-agent platform depending on the principles of software engineering life cycle. Int. J. Comput. Sci. Secur., 4: 482-490.
Direct Link  |  
Waleed, G.M. and H.M.Y. Al-Bayatti, 2011. A comparison of trojan virus behavior in linux and windows operating systems. World Comput. Sci. Inform. Technol. J., 1: 56-62.
Direct Link  |  
Waleed, G.M., 2011. Authentication and Virus Detection Enhancement for Client and Server Applications. J. Emerging Trends Comput. Inf. Sci., 2: 390-395.
Direct Link  |  
Waleed, G.M., 2011. User Secure Tunnel Over a Non-Secure Internet based on Cryptography. J. Comput. Sci. Eng., 10: 17-22.
Waleed, G.M., H.M. Yousif and J. Jalil, 2008. Agent system concept and their application. J. Baghdad College Econ. Sci. Univ., 18: 1-12.
Waleed, G.M., I.H. Al-Husasani and J. Jaleel, 2008. A framework proposal for security in distributed agent system. J. Inform. Technol. Iraqi, 2: 85-102.
Waleed, G.M., J. Jalil and H.M. Yousif, 2008. Noise reduction via Genetic Algorithm (GA). J. Baghdad College Econ. Sci. Univ., 17: 21-35.
Waleed, G.M., M. Faizal, R.B. Ahmad, M.B. Fareq, A. Malek and M.A. Ghani, 2009. Bluetooth wireless network authentication using radio frequency communication protocol. J. Comput. Sci., 5: 646-650.
CrossRef  |  Direct Link  |  

  SCImago Journal & Country Rank