关注
Rossilawati Sulaiman
Rossilawati Sulaiman
在 ukm.edu.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
Lightweight encryption technique to enhance medical image security on internet of medical things applications
MK Hasan, S Islam, R Sulaiman, S Khan, AHA Hashim, S Habib, M Islam, ...
IEEE Access 9, 47731-47742, 2021
1792021
Students’ perception of mobile augmented reality applications in learning computer organization
NA Abd Majid, H Mohammed, R Sulaiman
Procedia-Social and Behavioral Sciences 176, 111-116, 2015
1212015
A review on text steganography techniques
MA Majeed, R Sulaiman, Z Shukur, MK Hasan
Mathematics 9 (21), 2829, 2021
672021
Cloud data encryption and authentication based on enhanced Merkle hash tree method.
JS Jayaprakash, K Balasubramanian, R Sulaiman, MK Hasan, ...
Computers, Materials & Continua 72 (1), 2022
592022
Social engineering attacks prevention: A systematic literature review
W Syafitri, Z Shukur, U Asma’Mokhtar, R Sulaiman, MA Ibrahim
IEEE access 10, 39325-39343, 2022
572022
Optimized leaky ReLU for handwritten Arabic character recognition using convolution neural networks
BH Nayef, SNHS Abdullah, R Sulaiman, ZAA Alyasseri
Multimedia Tools and Applications, 1-30, 2022
462022
Systematic literature review on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Procedia technology 11, 86-92, 2013
342013
AN IMPROVED LSB IMAGE STEGANOGRAPHY TECHNIQUE USING BIT-INVERSE IN 24 BIT COLOUR IMAGE.
MA Majeed, R Sulaiman
Journal of Theoretical & Applied Information Technology 80 (2), 2015
332015
A security architecture for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
302008
A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges
AHA AL-Jumaili, YIA Mashhadany, R Sulaiman, ZAA Alyasseri
Applied Sciences 11 (21), 9820, 2021
292021
E-health services with secure mobile agent
R Sulaiman, X Huang, D Sharma
2009 seventh annual communication networks and services research conference …, 2009
282009
Issues and trends in information security policy compliance
SH Bhaharin, U Asma’Mokhtar, R Sulaiman, MM Yusof
2019 6th International Conference on Research and Innovation in Information …, 2019
272019
Machine learning-based technique to detect SQL injection attack
MA Azman, MF Marhusin, R Sulaiman
Journal of Computer Science, 2021
252021
A comparative study on the advancement of text steganography techniques in digital media
SS Baawi, MR Mokhtar, R Sulaiman
ARPN J. Eng. Appl. Sci 13 (5), 1854-1863, 2018
252018
A survey on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Asian Journal of Information Technology 15 (24), 5137-5144, 2016
222016
New text steganography technique based on a set of two-letter words
SS Baawi, MR Mokhtar, R Sulaiman
Journal of Theoretical and Applied Information Technology 95 (22), 6247-6255, 2017
192017
A user protection model for the trusted computing environment
MI Alshar'e, R Sulaiman, MR Mukhtar, AM Zin
Journal of Computer Science 10 (9), 1692, 2014
172014
EVALUATION OF THE TPM USER AUTHENTICATION MODEL FOR TRUSTED COMPUTERS.
M ALSHAR'E, AM Zin, R Sulaiman, MR Mokhtar
Journal of Theoretical & Applied Information Technology 81 (2), 2015
152015
High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm
AA Almayyahi, R Sulaiman, F Qamar, AE Hamzah
International Journal of Advanced Computer Science and Applications 11 (10 …, 2020
132020
Design and Implementation of the TPM User Authentication Model.
MI Alshar'e, R Sulaiman, MR Mokhtar, AM Zin
J. Comput. Sci. 10 (11), 2299-2314, 2014
132014
系统目前无法执行此操作,请稍后再试。
文章 1–20