1. Abu Al-Haija, Qasem, and Tawalbeh, Loai. (2019). "Autoregressive Modeling and Prediction of Annual Worldwide Cybercrimes for Cloud Environments", IEEE 10th International Conference on Information & Communication Systems (10th ICICS 2019)
2. Al-Haija, Qasem, AlShuaibi, Abdullah, Al Badawi, Ahmad. (2018). “Frequency Analysis of 32-bit Modular Divider Based on Extended GCD Algorithm for Different FPGA chips”, International Journal of Computers & Technology (IJCT), vol. 17, no. 1, pp. 7133-7139.
3. Paar, Christof, and Pelzl, Jan. (2010), “Understanding Cryptography”, Springer-Verlag Berlin Heidelberg Publisher. https://doi.org/10.1007/978-3-642-04101-3.
4. Trappe, Wade, and Washington, L. C. (2002). Introduction to Cryptography with Coding Theory. By Prentice Hall, 1: 1-176. http://calclab.math.tamu.edu/~rahe/2014a_673_700720/Trappe_2006.pdf
5. "Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age";Levy;published by Penguin Books,2001