Obserwuj
Rossilawati Sulaiman
Rossilawati Sulaiman
Zweryfikowany adres z ukm.edu.my
Tytuł
Cytowane przez
Cytowane przez
Rok
Lightweight encryption technique to enhance medical image security on internet of medical things applications
MK Hasan, S Islam, R Sulaiman, S Khan, AHA Hashim, S Habib, M Islam, ...
IEEE Access 9, 47731-47742, 2021
2072021
Students’ perception of mobile augmented reality applications in learning computer organization
NA Abd Majid, H Mohammed, R Sulaiman
Procedia-Social and Behavioral Sciences 176, 111-116, 2015
1272015
Social engineering attacks prevention: A systematic literature review
W Syafitri, Z Shukur, U Asma’Mokhtar, R Sulaiman, MA Ibrahim
IEEE access 10, 39325-39343, 2022
1092022
A review on text steganography techniques
MA Majeed, R Sulaiman, Z Shukur, MK Hasan
Mathematics 9 (21), 2829, 2021
932021
Cloud data encryption and authentication based on enhanced Merkle hash tree method.
JS Jayaprakash, K Balasubramanian, R Sulaiman, MK Hasan, ...
Computers, Materials & Continua 72 (1), 2022
692022
Optimized leaky ReLU for handwritten Arabic character recognition using convolution neural networks
BH Nayef, SNHS Abdullah, R Sulaiman, ZAA Alyasseri
Multimedia Tools and Applications, 1-30, 2022
612022
A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges
AHA AL-Jumaili, YIA Mashhadany, R Sulaiman, ZAA Alyasseri
Applied Sciences 11 (21), 9820, 2021
432021
Systematic literature review on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Procedia technology 11, 86-92, 2013
382013
AN IMPROVED LSB IMAGE STEGANOGRAPHY TECHNIQUE USING BIT-INVERSE IN 24 BIT COLOUR IMAGE.
MA Majeed, R Sulaiman
Journal of Theoretical & Applied Information Technology 80 (2), 2015
362015
An explainable ensemble deep learning approach for intrusion detection in industrial internet of things
MS Mousa'B, MK Hasan, R Sulaiman, S Islam, AUR Khan
IEEE Access 11, 115047-115061, 2023
352023
Machine learning-based technique to detect SQL injection attack
MA Azman, MF Marhusin, R Sulaiman, U Sains, MF Marhusin, U Sains
Journal of Computer Science 17 (3), 296-303, 2021
342021
Issues and trends in information security policy compliance
SH Bhaharin, U Asma’Mokhtar, R Sulaiman, MM Yusof
2019 6th International Conference on Research and Innovation in Information …, 2019
302019
A comparative study on the advancement of text steganography techniques in digital media
SS Baawi, MR Mokhtar, R Sulaiman
ARPN J. Eng. Appl. Sci 13 (5), 1854-1863, 2018
302018
E-health services with secure mobile agent
R Sulaiman, X Huang, D Sharma
2009 seventh annual communication networks and services research conference …, 2009
292009
A security architecture for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
292008
A survey on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Asian Journal of Information Technology 15 (24), 5137-5144, 2016
222016
A review on security techniques in image steganography
S Ghoul, R Sulaiman, Z Shukur
International Journal of Advanced Computer Science and Applications 14 (6), 2023
182023
New text steganography technique based on a set of two-letter words
SS Baawi, MR Mokhtar, R Sulaiman
Journal of Theoretical and Applied Information Technology 95 (22), 6247-6255, 2017
182017
High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm
AA Almayyahi, R Sulaiman, F Qamar, AE Hamzah
International Journal of Advanced Computer Science and Applications 11 (10 …, 2020
152020
Enhancement of text steganography technique using Lempel-Ziv-Welch Algorithm and two-letter word technique
SS Baawi, MR Mokhtar, R Sulaiman
Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019
152019
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20