·
Mohammad
Alia and Khaled Suwais, (2020), A
Novel Steganography Scheme based on Fractal Set, International Arab Journal of Information Technology, Vol. 17, No. 1. [ISI/ Scopus Indexed].
·
Ali
Alshahrani, Khaled Suwais, Basil Kasasbeh, (2018), Authentication
Method in Software-Defined Network Based On Ciphertext-Policy Attributes Based
Encryption, International Journal of Innovative Computing, Information and Control,
Vol. 14, No. 5. [ESCI/Scopus Indexed]
·
Sally
Almanasra, Khaled Suwais, (2018), 3D Model for Optimizing the Communication Topologies of Iterated
N-Players Prisoners’ Dilemma, International Journal of Applied Decision
Sciences, Vol. 11, No. 4. [ESCI/Scopus Indexed].
·
Khaled
Suwais and Ali Alshahrani, (2018), The impact of Virtual Classes on Students’ performance in Open
Learning Environments: The Case of Arab Open University, Saudi Arabia, Journal
of Computer Sciences, Vol. 14, No. 1. [ESCI/Scopus
Indexed]
·
Khaled
Suwais, (2017), Social–Global Neighbourhood Topology for Evolving
Cooperative Behavior of Iterated n-Players Prisoners’ Dilemma, International
Journal of Mathematics in Operational Research, Vol. 11, No. 1 [Scopus
Indexed]
·
Khaled
Suwais, (2016), Assessing the Utilization of Automata in
Representing Players’ Behaviors in Game Theory, International
Journal of Ambient Computing and Intelligence, Vol. 6, No. 2. [Scopus Indexed]
·
Sally
Almanasra, Khaled Suwais and Muhamad Rafie, (2016), Adaptive Automata-based Model for Iterated n-Players Prisoners’
Dilemma, International Arab Journal of Information Technology, Vol 13,
No.1. [ISI/ Scopus Indexed].
·
Khaled
Suwais and Ayham Fayyoumi, (2015), Online Exam Questions Distribution Technique based on Terminals
Locations the Case of Arab Open University, Journal of Computations &
Modelling, Vol. 5, No. 1.
·
Khaled
Suwais, (2014), New Parallel Model for Rabbit Stream Cipher over Multi-core Processor,
WSEAES Transactions on Information Science and Applications, Vol. 11.
[Scopus Indexed].
·
Khaled
Suwais, Rana Al-Otaibi and Ali Alshahrani, (2013), Saudi
License Plate Recognition Algorithm Based on Support Vector Machine, Journal
of Electronic Sciences and Technology, Vol. 11 (4): 424-428 [Scopus
Indexed].
·
Sally
Almanasra, Khaled Suwais and Muhamad Rafie, (2012), Adaptive Automata Model for Learning Opponent Behavior based on Genetic
Algorithm. Scientific Research and Essays, Vol. 7 (42): 3609-3620.
·
Khaled
Suwais and Azman Samsudin,
(2011), LTSC-128: Stream Cipher Based on the Intractable
Shortest Vector Problem in Lattice. Journal of Digital Information
Management, Vol. 9(1): 27-32 [Scopus Indexed].
·
Khaled
Suwais, (2011), Intelligent Adaptive Model for Secure A5/1 Stream Cipher, International
Journal of Information Processing and Management, Vol. 2(1): 124-132.
[Scopus Indexed].
· Khaled Suwais and Azman
Samsudin, (2008), DSP-128: Stream
Cipher Based on Discrete Log Problem,
American Journal of Applied Sciences, Vol. 5(7): 896-904. [Scopus Indexed].
Khaled Suwais and Azman Samsudin, (2008), High
Performance Multithreaded Model for Stream Ciphers, International Journal of Computer Science & Network Security,
Vol. 8(3): 228-233.
·
Sally
Almanasra, Khaled Suwais and Muhammad
Rafie, (2013), The Applications of Automata in Game Theory,
Intelligent Technologies and Techniques for Pervasive Computing, IGI-Global: ISBN 978-146-6640-38-2.
Khaled Suwais and Azman Samsudin, (2010), New
Classifications of Existing Stream Ciphers, Computational Intelligence & Modern Heuristics, IN-TECH:
ISBN 978-953-7619-28-2.
·
Abdalla
Wasef Marashdih, Zarul Fitri Zaaba and Khaled
Suwais,
(2019), Web Application Security: An Investigation on Static Analysis
with other Algorithms to Detect Cross-Site Scripting, Procedia Computer
Science, Vol. 161, Pages
1173-1181. [Scopus/Elsevier Indexed].
·
Abdalla
Wasef Marashdih, Zarul Fitri Zaaba and Khaled
Suwais,
(2018), Cross Site Scripting: Investigations in PHP Web Application,
2018 International Conference on Promising Electronic Technologies, IEEE, Palestinian
Authority.