Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence R Enayatifar, AH Abdullah, IF Isnin Optics and Lasers in Engineering 56, 83-93, 2014 | 452 | 2014 |
Image encryption using a synchronous permutation-diffusion technique R Enayatifar, AH Abdullah, IF Isnin, A Altameem, M Lee Optics and Lasers in Engineering 90, 146-154, 2017 | 261 | 2017 |
A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata R Enayatifar, HJ Sadaei, AH Abdullah, M Lee, IF Isnin Optics and Lasers in Engineering 71, 33-41, 2015 | 160 | 2015 |
Bio-mimic optimization strategies in wireless sensor networks: A survey MA Adnan, MA Razzaque, I Ahmed, IF Isnin Sensors 14 (1), 299-345, 2013 | 152 | 2013 |
Enhanced chaotic image encryption algorithm based on Baker's map M Salleh, S Ibrahim, IF Isnin Proceedings of the 2003 International Symposium on Circuits and Systems …, 2003 | 95 | 2003 |
T-MQM: Testbed-based multi-metric quality measurement of sensor deployment for precision agriculture—A case study O Kaiwartya, AH Abdullah, Y Cao, RS Raw, S Kumar, DK Lobiyal, IF Isnin, ... IEEE Sensors Journal 16 (23), 8649-8664, 2016 | 84 | 2016 |
Image encryption algorithm based on chaotic mapping M Salleh, S Ibrahim, IF Isnin Jurnal Teknologi (Sciences & Engineering), 1–12-1–12, 2003 | 79 | 2003 |
Security and privacy enhancement in VANETs using mobility pattern FA Ghaleb, MA Razzaque, IF Isnin 2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN …, 2013 | 36 | 2013 |
Rushing attack against routing protocols in Mobile Ad-Hoc Networks SM Ghoreishi, S Abd Razak, IF Isnin, H Chizari 2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014 | 17 | 2014 |
Ciphering key of chaos image encryption M Salleh, S Ibrahim, IF Isnin Universiti Teknologi Malaysia, 2002 | 15 | 2002 |
Control messages overhead impact on destination oriented directed acyclic graph—a wireless sensor networks objective functions performance comparison IU Onwuegbuzie, SA Razak, IF Isnin Journal of Computational and Theoretical Nanoscience 17 (2-3), 1227-1235, 2020 | 14 | 2020 |
New secure identity-based and certificateless authenticated Key Agreement protocols without pairings SM Ghoreishi, S Abd Razak, IF Isnin, H Chizari 2014 International Symposium on Biometrics and Security Technologies (ISBAST …, 2014 | 14 | 2014 |
A survey on network on chip routing algorithms criteria M Kaleem, IFB Isnin Advances on Smart and Soft Computing: Proceedings of ICACIn 2020, 455-466, 2021 | 13 | 2021 |
Seluge++: A secure over-the-air programming scheme in wireless sensor networks F Doroodgar, MA Razzaque, IF Isnin Sensors 14 (3), 5004-5040, 2014 | 13 | 2014 |
Cluster-based wireless sensor network framework for denial-of-service attack detection based on variable selection ensemble machine learning algorithms A John, IFB Isnin, SHH Madni, M Faheem Intelligent Systems with Applications 22, 200381, 2024 | 12 | 2024 |
Prioritized Shortest Path Computation Mechanism (PSPCM) for wireless sensor networks IU Onwuegbuzie, SA Razak, IF Isnin, A Al-Dhaqm, NB Anuar Plos one 17 (3), e0264683, 2022 | 8 | 2022 |
Performance evaluation for ContikiMAC, XMAC, CXMAC and NullMAC protocols for energy efficient wireless sensor networks IU Onwuegbuzie, S Abd Razak, IF Isnin 2019 IEEE Conference on Wireless Sensors (ICWiSe), 12-17, 2019 | 8 | 2019 |
Performance evaluation of routing protocol on aodv and dsr under wormhole attack MG Sanaei, IF Isnin, M Bakhtiari International Journal of Computer Networks and Communications Security 1, 198, 2013 | 8 | 2013 |
Fairness evaluation and comparison of current congestion control techniques U Ahmad, MAB Ngadi, IFB Isnin Indonesian journal of Electrical engineering and computer science 1 (1), 176-181, 2016 | 7 | 2016 |
A novel secure two-party identity-based authenticated key agreement protocol without bilinear pairings SM Ghoreishi, IF Isnin, SA Razak, H Chizari Pattern Analysis, Intelligent Security and the Internet of Things, 287-294, 2015 | 7 | 2015 |