Ikuti
Rossilawati Sulaiman
Rossilawati Sulaiman
Email yang diverifikasi di ukm.edu.my
Judul
Dikutip oleh
Dikutip oleh
Tahun
Lightweight encryption technique to enhance medical image security on internet of medical things applications
MK Hasan, S Islam, R Sulaiman, S Khan, AHA Hashim, S Habib, M Islam, ...
IEEE Access 9, 47731-47742, 2021
2112021
Students’ perception of mobile augmented reality applications in learning computer organization
NA Abd Majid, H Mohammed, R Sulaiman
Procedia-Social and Behavioral Sciences 176, 111-116, 2015
1262015
Social engineering attacks prevention: A systematic literature review
W Syafitri, Z Shukur, U Asma’Mokhtar, R Sulaiman, MA Ibrahim
IEEE access 10, 39325-39343, 2022
1022022
A review on text steganography techniques
MA Majeed, R Sulaiman, Z Shukur, MK Hasan
Mathematics 9 (21), 2829, 2021
972021
Cloud data encryption and authentication based on enhanced Merkle hash tree method.
JS Jayaprakash, K Balasubramanian, R Sulaiman, MK Hasan, ...
Computers, Materials & Continua 72 (1), 2022
692022
Optimized leaky ReLU for handwritten Arabic character recognition using convolution neural networks
BH Nayef, SNHS Abdullah, R Sulaiman, ZAA Alyasseri
Multimedia Tools and Applications, 1-30, 2022
612022
A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges
AHA AL-Jumaili, YIA Mashhadany, R Sulaiman, ZAA Alyasseri
Applied Sciences 11 (21), 9820, 2021
432021
Systematic literature review on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Procedia technology 11, 86-92, 2013
392013
AN IMPROVED LSB IMAGE STEGANOGRAPHY TECHNIQUE USING BIT-INVERSE IN 24 BIT COLOUR IMAGE.
MA Majeed, R Sulaiman
Journal of Theoretical & Applied Information Technology 80 (2), 2015
352015
An explainable ensemble deep learning approach for intrusion detection in industrial Internet of Things
MS Mousa'B, MK Hasan, R Sulaiman, S Islam, AUR Khan
IEEE Access 11, 115047-115061, 2023
342023
Machine learning-based technique to detect SQL injection attack
MA Azman, MF Marhusin, R Sulaiman, U Sains, MF Marhusin, U Sains
Journal of Computer Science 17 (3), 296-303, 2021
342021
Issues and trends in information security policy compliance
SH Bhaharin, U Asma’Mokhtar, R Sulaiman, MM Yusof
2019 6th International Conference on Research and Innovation in Information …, 2019
312019
A security architecture for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
312008
A comparative study on the advancement of text steganography techniques in digital media
SS Baawi, MR Mokhtar, R Sulaiman
ARPN J. Eng. Appl. Sci 13 (5), 1855-1863, 2018
302018
E-health services with secure mobile agent
R Sulaiman, X Huang, D Sharma
2009 seventh annual communication networks and services research conference …, 2009
282009
A survey on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Asian Journal of Information Technology 15 (24), 5137-5144, 2016
222016
New text steganography technique based on a set of two-letter words
SS Baawi, MR Mokhtar, R Sulaiman
Journal of Theoretical and Applied Information Technology 95 (22), 6247-6255, 2017
202017
A review on security techniques in image steganography
S Ghoul, R Sulaiman, Z Shukur
International Journal of Advanced Computer Science and Applications 14 (6), 2023
182023
A user protection model for the trusted computing environment
MI Alshar'e, R Sulaiman, MR Mukhtar, AM Zin
Journal of Computer Science 10 (9), 1692, 2014
182014
Enhancement of text steganography technique using Lempel-Ziv-Welch Algorithm and two-letter word technique
SS Baawi, MR Mokhtar, R Sulaiman
Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019
152019
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20