Lightweight encryption technique to enhance medical image security on internet of medical things applications MK Hasan, S Islam, R Sulaiman, S Khan, AHA Hashim, S Habib, M Islam, ... IEEE Access 9, 47731-47742, 2021 | 207 | 2021 |
Students’ perception of mobile augmented reality applications in learning computer organization NA Abd Majid, H Mohammed, R Sulaiman Procedia-Social and Behavioral Sciences 176, 111-116, 2015 | 127 | 2015 |
Social engineering attacks prevention: A systematic literature review W Syafitri, Z Shukur, U Asma’Mokhtar, R Sulaiman, MA Ibrahim IEEE access 10, 39325-39343, 2022 | 109 | 2022 |
A review on text steganography techniques MA Majeed, R Sulaiman, Z Shukur, MK Hasan Mathematics 9 (21), 2829, 2021 | 93 | 2021 |
Cloud data encryption and authentication based on enhanced Merkle hash tree method. JS Jayaprakash, K Balasubramanian, R Sulaiman, MK Hasan, ... Computers, Materials & Continua 72 (1), 2022 | 69 | 2022 |
Optimized leaky ReLU for handwritten Arabic character recognition using convolution neural networks BH Nayef, SNHS Abdullah, R Sulaiman, ZAA Alyasseri Multimedia Tools and Applications, 1-30, 2022 | 61 | 2022 |
A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges AHA AL-Jumaili, YIA Mashhadany, R Sulaiman, ZAA Alyasseri Applied Sciences 11 (21), 9820, 2021 | 43 | 2021 |
Systematic literature review on data carving in digital forensic N Alherbawi, Z Shukur, R Sulaiman Procedia technology 11, 86-92, 2013 | 38 | 2013 |
AN IMPROVED LSB IMAGE STEGANOGRAPHY TECHNIQUE USING BIT-INVERSE IN 24 BIT COLOUR IMAGE. MA Majeed, R Sulaiman Journal of Theoretical & Applied Information Technology 80 (2), 2015 | 36 | 2015 |
An explainable ensemble deep learning approach for intrusion detection in industrial internet of things MS Mousa'B, MK Hasan, R Sulaiman, S Islam, AUR Khan IEEE Access 11, 115047-115061, 2023 | 35 | 2023 |
Machine learning-based technique to detect SQL injection attack MA Azman, MF Marhusin, R Sulaiman, U Sains, MF Marhusin, U Sains Journal of Computer Science 17 (3), 296-303, 2021 | 34 | 2021 |
Issues and trends in information security policy compliance SH Bhaharin, U Asma’Mokhtar, R Sulaiman, MM Yusof 2019 6th International Conference on Research and Innovation in Information …, 2019 | 30 | 2019 |
A comparative study on the advancement of text steganography techniques in digital media SS Baawi, MR Mokhtar, R Sulaiman ARPN J. Eng. Appl. Sci 13 (5), 1854-1863, 2018 | 30 | 2018 |
E-health services with secure mobile agent R Sulaiman, X Huang, D Sharma 2009 seventh annual communication networks and services research conference …, 2009 | 29 | 2009 |
A security architecture for e-health services R Sulaiman, D Sharma, W Ma, D Tran 2008 10th International Conference on Advanced Communication Technology 2 …, 2008 | 29 | 2008 |
A survey on data carving in digital forensic N Alherbawi, Z Shukur, R Sulaiman Asian Journal of Information Technology 15 (24), 5137-5144, 2016 | 22 | 2016 |
A review on security techniques in image steganography S Ghoul, R Sulaiman, Z Shukur International Journal of Advanced Computer Science and Applications 14 (6), 2023 | 18 | 2023 |
New text steganography technique based on a set of two-letter words SS Baawi, MR Mokhtar, R Sulaiman Journal of Theoretical and Applied Information Technology 95 (22), 6247-6255, 2017 | 18 | 2017 |
High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm AA Almayyahi, R Sulaiman, F Qamar, AE Hamzah International Journal of Advanced Computer Science and Applications 11 (10 …, 2020 | 15 | 2020 |
Enhancement of text steganography technique using Lempel-Ziv-Welch Algorithm and two-letter word technique SS Baawi, MR Mokhtar, R Sulaiman Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019 | 15 | 2019 |