CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data R Thabit, NI Udzir, SM Yasin, A Asmawi, AAA Gutub IEEE Access 10, 65439-65458, 2022 | 21 | 2022 |
A comparative analysis of arabic text steganography R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan, R Din Applied Sciences 11 (15), 6851, 2021 | 20 | 2021 |
Traid-bit embedding process on Arabic text steganography method R Din, RA Thabit, NI Udzir, S Utama Bulletin of Electrical Engineering and Informatics 10 (1), 493-500, 2021 | 9 | 2021 |
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection NA Roslan, NI Udzir, R Mahmod, ZA Zukarnain, MIH Ninggal, R Thabit Journal of Theoretical and Applied Information Technology 98 (24), 4140-4157, 2020 | 6 | 2020 |
A secure edge computing model using machine learning and IDS to detect and isolate intruders GA Poornima Mahadevappa a ,Raja Kumar Murugesan, Redhwan Al-amri, Reema ... MethodsX 12 (102597), 2024 | 1 | 2024 |
Data encryption-enabled cloud cost optimization and energy efficiency-based border security model MF Alomari, MA Mahmoud, YB Yusoff, N Gharaei, RA Abdalla, ... IEEE Access, 2023 | 1 | 2023 |
Secure Trust Node Acquisition and Access Control for Privacy-Preserving Expertise Trust in WBAN Networks Forthcoming Networks and Sustainability in the AIoT Era 1036, 265-275, 2024 | | 2024 |
Secure and Efficient Classification of Trusted and Untrusted Nodes in Wireless Body Area Networks: A Survey of Techniques and Applications PSHRP Israa Ibraheem Al Barazanchi, Wahidah Hashim, Reema Thabit, Ravi Sekhar Forthcoming Networks and Sustainability in the AIoT Era 1036, 255-264, 2024 | | 2024 |