An overview of principal component analysis S Karamizadeh, SM Abdullah, AA Manaf, M Zamani, A Hooman Journal of signal and information processing 4 (3), 173-175, 2013 | 688 | 2013 |
Advantage and drawback of support vector machine functionality S Karamizadeh, SM Abdullah, M Halimi, J Shayan, M javad Rajabi 2014 international conference on computer, communications, and control …, 2014 | 259 | 2014 |
Review of recent detection methods for HTTP DDoS attack GA Jaafar, SM Abdullah, S Ismail Journal of Computer Networks and Communications 2019 (1), 1283472, 2019 | 159 | 2019 |
A genetic-algorithm-based approach for audio steganography M Zamani, AA Manaf, RB Ahmad, AM Zeki, S Abdullah International Journal of Computer and Information Engineering 3 (6), 1562-1565, 2009 | 98 | 2009 |
A taxonomy of SQL injection attacks A Sadeghian, M Zamani, SM Abdullah 2013 International Conference on Informatics and Creative Multimedia, 269-273, 2013 | 63 | 2013 |
A robust video watermarking technique for the tamper detection of surveillance systems F Arab, SM Abdullah, SZM Hashim, AA Manaf, M Zamani Multimedia Tools and Applications 75, 10855-10885, 2016 | 62 | 2016 |
RETRACTED ARTICLE: Temperature-based estimation of global solar radiation using soft computing methodologies K Mohammadi, S Shamshirband, AS Danesh, MS Abdullah, M Zamani Theoretical and applied climatology 125, 101-112, 2016 | 44 | 2016 |
Capacity and quality improvement in reversible image watermarking approach SM Abdullah, AA Manaf, M Zamani The 6th International Conference on Networked Computing and Advanced …, 2010 | 40 | 2010 |
Correlation between PSNR and bit per sample rate in audio steganography M Zamani, ABA Manaf, SM Abdullah, SS Chaeikar 11th International Conference on Signal Processing. Pgs, 163-168, 2012 | 38 | 2012 |
An overview on audio steganography techniques M Zamani, ABA Manaf, SM Abdullah International Journal of Digital Content Technology and Its Applications 6 (13), 2012 | 38 | 2012 |
Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking A Shaamala, SM Abdullah, AA Manaf International Journal of Computer Science Issues (IJCSI) 8 (5), 220, 2011 | 37 | 2011 |
Pattern recognition techniques: studies on appropriate classifications S Karamizadeh, SM Abdullah, M Zamani, A Kherikhah Advanced Computer and Communication Engineering Technology: Proceedings of …, 2015 | 36 | 2015 |
Mazdak technique for PSNR estimation in audio steganography Z Mazdak, BAM Azizah, MA Shahidan, SC Saman Applied Mechanics and Materials 229, 2798-2803, 2012 | 35 | 2012 |
An automated approach to detect deauthentication and disassociation dos attacks on wireless 802.11 networks HA Noman, SM Abdullah, HI Mohammed International Journal of Computer Science Issues (IJCSI) 12 (4), 107, 2015 | 33 | 2015 |
Recursive reversible image watermarking using enhancement of difference expansion techniques SM Abdullah, AA Manaf, M Zamani Journal of Information Security Research 1 (2), 64-70, 2010 | 31 | 2010 |
Genetic algorithm as an approach to resolve the problems of substitution techniques of audio steganography M Zamani | 31 | 2009 |
An overview of holistic face recognition S Karamizadeh, SM Abdullah, M Zamani IJRCCT 2 (9), 738-741, 2013 | 30 | 2013 |
Efficient embedding for audio steganography M Zamani, ABA Manaf, SM Abdullah 2nd International Conference on Environment, Economics, Energy, Devices …, 2012 | 29 | 2012 |
Experimental studies of the ZigBee frequency agility mechanism in home area networks MA Sarijari, MS Abdullah, A Lo, RA Rashid 39th Annual IEEE Conference on Local Computer Networks Workshops, 711-717, 2014 | 27 | 2014 |
A confidential RFID model to prevent unauthorized access M Gharooni, M Zamani, M Mansourizadeh, S Abdullah 2011 5th International Conference on Application of Information and …, 2011 | 27 | 2011 |