Seguir
Rossilawati Sulaiman
Rossilawati Sulaiman
Dirección de correo verificada de ukm.edu.my
Título
Citado por
Citado por
Año
Lightweight encryption technique to enhance medical image security on internet of medical things applications
MK Hasan, S Islam, R Sulaiman, S Khan, AHA Hashim, S Habib, M Islam, ...
IEEE Access 9, 47731-47742, 2021
1692021
Students’ perception of mobile augmented reality applications in learning computer organization
NA Abd Majid, H Mohammed, R Sulaiman
Procedia-Social and Behavioral Sciences 176, 111-116, 2015
1182015
Cloud data encryption and authentication based on enhanced Merkle hash tree method.
JS Jayaprakash, K Balasubramanian, R Sulaiman, MK Hasan, ...
Computers, Materials & Continua 72 (1), 2022
592022
A review on text steganography techniques
MA Majeed, R Sulaiman, Z Shukur, MK Hasan
Mathematics 9 (21), 2829, 2021
542021
Social engineering attacks prevention: A systematic literature review
W Syafitri, Z Shukur, U Asma’Mokhtar, R Sulaiman, MA Ibrahim
IEEE access 10, 39325-39343, 2022
512022
Optimized leaky ReLU for handwritten Arabic character recognition using convolution neural networks
BH Nayef, SNHS Abdullah, R Sulaiman, ZAA Alyasseri
Multimedia Tools and Applications, 1-30, 2022
412022
AN IMPROVED LSB IMAGE STEGANOGRAPHY TECHNIQUE USING BIT-INVERSE IN 24 BIT COLOUR IMAGE.
MA Majeed, R Sulaiman
Journal of Theoretical & Applied Information Technology 80 (2), 2015
322015
Systematic literature review on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Procedia technology 11, 86-92, 2013
322013
A security architecture for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
292008
E-health services with secure mobile agent
R Sulaiman, X Huang, D Sharma
2009 seventh annual communication networks and services research conference …, 2009
282009
A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges
AHA AL-Jumaili, YIA Mashhadany, R Sulaiman, ZAA Alyasseri
Applied Sciences 11 (21), 9820, 2021
262021
Issues and trends in information security policy compliance
SH Bhaharin, U Asma’Mokhtar, R Sulaiman, MM Yusof
2019 6th International Conference on Research and Innovation in Information …, 2019
252019
Machine learning-based technique to detect SQL injection attack
MA Azman, MF Marhusin, R Sulaiman
Journal of Computer Science, 2021
242021
A comparative study on the advancement of text steganography techniques in digital media
SS Baawi, MR Mokhtar, R Sulaiman
ARPN J. Eng. Appl. Sci 13 (5), 1855-1863, 2018
242018
A survey on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Asian Journal of Information Technology 15 (24), 5137-5144, 2016
222016
New text steganography technique based on a set of two-letter words
SS Baawi, MR Mokhtar, R Sulaiman
Journal of Theoretical and Applied Information Technology 95 (22), 6247-6255, 2017
192017
A user protection model for the trusted computing environment
MI Alshar'e, R Sulaiman, MR Mukhtar, AM Zin
Journal of Computer Science 10 (9), 1692, 2014
172014
EVALUATION OF THE TPM USER AUTHENTICATION MODEL FOR TRUSTED COMPUTERS.
M ALSHAR'E, AM Zin, R Sulaiman, MR Mokhtar
Journal of Theoretical & Applied Information Technology 81 (2), 2015
152015
Design and Implementation of the TPM User Authentication Model.
MI Alshar'e, R Sulaiman, MR Mokhtar, AM Zin
J. Comput. Sci. 10 (11), 2299-2314, 2014
132014
Enhancing security in e-health services using agent
R Sulaiman, D Sharma
Proceedings of the 2011 International Conference on Electrical Engineering …, 2011
132011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20