· Mohammad Alia and Khaled Suwais, (2020), A Novel Steganography Scheme based on Fractal Set, International Arab Journal of Information Technology, Vol. 17, No. 1. [ISI/ Scopus Indexed].
· Ali Alshahrani, Khaled Suwais, Basil Kasasbeh, (2018), Authentication Method in Software-Defined Network Based On Ciphertext-Policy Attributes Based Encryption, International Journal of Innovative Computing, Information and Control, Vol. 14, No. 5. [ESCI/Scopus Indexed]
· Sally Almanasra, Khaled Suwais, (2018), 3D Model for Optimizing the Communication Topologies of Iterated N-Players Prisoners’ Dilemma, International Journal of Applied Decision Sciences, Vol. 11, No. 4. [ESCI/Scopus Indexed].
· Khaled Suwais and Ali Alshahrani, (2018), The impact of Virtual Classes on Students’ performance in Open Learning Environments: The Case of Arab Open University, Saudi Arabia, Journal of Computer Sciences, Vol. 14, No. 1. [ESCI/Scopus Indexed]
· Khaled Suwais, (2017), Social–Global Neighbourhood Topology for Evolving Cooperative Behavior of Iterated n-Players Prisoners’ Dilemma, International Journal of Mathematics in Operational Research, Vol. 11, No. 1 [Scopus Indexed]
· Khaled Suwais, (2016), Assessing the Utilization of Automata in Representing Players’ Behaviors in Game Theory, International Journal of Ambient Computing and Intelligence, Vol. 6, No. 2. [Scopus Indexed]
· Sally Almanasra, Khaled Suwais and Muhamad Rafie, (2016), Adaptive Automata-based Model for Iterated n-Players Prisoners’ Dilemma, International Arab Journal of Information Technology, Vol 13, No.1. [ISI/ Scopus Indexed].
· Khaled Suwais and Ayham Fayyoumi, (2015), Online Exam Questions Distribution Technique based on Terminals Locations the Case of Arab Open University, Journal of Computations & Modelling, Vol. 5, No. 1.
· Khaled Suwais, (2014), New Parallel Model for Rabbit Stream Cipher over Multi-core Processor, WSEAES Transactions on Information Science and Applications, Vol. 11. [Scopus Indexed].
· Khaled Suwais, Rana Al-Otaibi and Ali Alshahrani, (2013), Saudi License Plate Recognition Algorithm Based on Support Vector Machine, Journal of Electronic Sciences and Technology, Vol. 11 (4): 424-428 [Scopus Indexed].
· Sally Almanasra, Khaled Suwais and Muhamad Rafie, (2012), Adaptive Automata Model for Learning Opponent Behavior based on Genetic Algorithm. Scientific Research and Essays, Vol. 7 (42): 3609-3620.
· Khaled Suwais and Azman Samsudin, (2011), LTSC-128: Stream Cipher Based on the Intractable Shortest Vector Problem in Lattice. Journal of Digital Information Management, Vol. 9(1): 27-32 [Scopus Indexed].
· Khaled Suwais, (2011), Intelligent Adaptive Model for Secure A5/1 Stream Cipher, International Journal of Information Processing and Management, Vol. 2(1): 124-132. [Scopus Indexed].
· Khaled Suwais and Azman Samsudin, (2008), DSP-128: Stream Cipher Based on Discrete Log Problem, American Journal of Applied Sciences, Vol. 5(7): 896-904. [Scopus Indexed].
Khaled Suwais and Azman Samsudin, (2008), High Performance Multithreaded Model for Stream Ciphers, International Journal of Computer Science & Network Security, Vol. 8(3): 228-233.
· Sally Almanasra, Khaled Suwais and Muhammad Rafie, (2013), The Applications of Automata in Game Theory, Intelligent Technologies and Techniques for Pervasive Computing, IGI-Global: ISBN 978-146-6640-38-2.
Khaled Suwais and Azman Samsudin, (2010), New Classifications of Existing Stream Ciphers, Computational Intelligence & Modern Heuristics, IN-TECH: ISBN 978-953-7619-28-2.
· Abdalla Wasef Marashdih, Zarul Fitri Zaaba and Khaled Suwais, (2019), Web Application Security: An Investigation on Static Analysis with other Algorithms to Detect Cross-Site Scripting, Procedia Computer Science, Vol. 161, Pages 1173-1181. [Scopus/Elsevier Indexed].
· Abdalla Wasef Marashdih, Zarul Fitri Zaaba and Khaled Suwais, (2018), Cross Site Scripting: Investigations in PHP Web Application, 2018 International Conference on Promising Electronic Technologies, IEEE, Palestinian Authority.