"Algorithms Using Fuzzy-Copeland Ranking Method Evaluation MCDM Multi-disjoint Paths Selection," International Journal of Communication Networks and Information Security (IJCNIS), Vol.5, pp. 59-67, March 2013.
"A New Watermarking Scheme for an in-Vivo Computer Based on Infection of E. coli," International Journal of Computer and Electrical Engineering, Vol.4, pp. 154-164, August 2012.
" A Novel Multi-Client Authentication Method Using Infection of Bacteria," International Journal of Information and Electronics Engineering, Vol.5, pp. 790-794, Sep 2012.
"Cryptanalysis of a Substitution-Permutation Network Using Gene Assembly in Ciliates," Int. J. Communications, Network and System Sciences (IJCNS), Vol. 5, pp. 154-164, March 2012.
"Breaking A Feistel-Type Block Cipher by Bacteria Engineering, " Advanced Computing: An International Journal (ACIJ), Vol.3, No.1, pp.1-23, January 2012.
"Achieving Secrecy for Images Using in-vivo DNA Cloning Techniques," International Journal of Advanced Computer Science, Vol. 1, No. 6, pp. 240-249, Dec. 2011.
"A Repair-less Genetic Algorithm for Scheduling Tasks onto Dynamically Reconfigurable Hardware," Journal International Review on Computers and Software (IRECOS) March 2011.
"A New Metric for On-Line Scheduling and Placement in Reconfigurable Computing Systems,” Lecture Notes in Computer Science - Algorithms and Architectures for Parallel Processing, pp.422-433, May 2010.
“Performance Evaluation of Decision Tree for Intrusion Detection Using Reduced Feature Spaces,” Lecture Notes in Electrical Engineering, Trends in Intelligent Systems and Computer Engineering, pp.273-, April 2008.
"Reaching to the Best Performance on the Superscalar Processors," ACM Computer Architecture News, Vol. 27, No.4, pp 6-11, Sep 1999.