Lightweight encryption technique to enhance medical image security on internet of medical things applications MK Hasan, S Islam, R Sulaiman, S Khan, AHA Hashim, S Habib, M Islam, ... IEEE Access 9, 47731-47742, 2021 | 179 | 2021 |
Students’ perception of mobile augmented reality applications in learning computer organization NA Abd Majid, H Mohammed, R Sulaiman Procedia-Social and Behavioral Sciences 176, 111-116, 2015 | 121 | 2015 |
A review on text steganography techniques MA Majeed, R Sulaiman, Z Shukur, MK Hasan Mathematics 9 (21), 2829, 2021 | 67 | 2021 |
Cloud data encryption and authentication based on enhanced Merkle hash tree method. JS Jayaprakash, K Balasubramanian, R Sulaiman, MK Hasan, ... Computers, Materials & Continua 72 (1), 2022 | 59 | 2022 |
Social engineering attacks prevention: A systematic literature review W Syafitri, Z Shukur, U Asma’Mokhtar, R Sulaiman, MA Ibrahim IEEE access 10, 39325-39343, 2022 | 57 | 2022 |
Optimized leaky ReLU for handwritten Arabic character recognition using convolution neural networks BH Nayef, SNHS Abdullah, R Sulaiman, ZAA Alyasseri Multimedia Tools and Applications, 1-30, 2022 | 46 | 2022 |
Systematic literature review on data carving in digital forensic N Alherbawi, Z Shukur, R Sulaiman Procedia technology 11, 86-92, 2013 | 34 | 2013 |
AN IMPROVED LSB IMAGE STEGANOGRAPHY TECHNIQUE USING BIT-INVERSE IN 24 BIT COLOUR IMAGE. MA Majeed, R Sulaiman Journal of Theoretical & Applied Information Technology 80 (2), 2015 | 33 | 2015 |
A security architecture for e-health services R Sulaiman, D Sharma, W Ma, D Tran 2008 10th International Conference on Advanced Communication Technology 2 …, 2008 | 30 | 2008 |
A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges AHA AL-Jumaili, YIA Mashhadany, R Sulaiman, ZAA Alyasseri Applied Sciences 11 (21), 9820, 2021 | 29 | 2021 |
E-health services with secure mobile agent R Sulaiman, X Huang, D Sharma 2009 seventh annual communication networks and services research conference …, 2009 | 28 | 2009 |
Issues and trends in information security policy compliance SH Bhaharin, U Asma’Mokhtar, R Sulaiman, MM Yusof 2019 6th International Conference on Research and Innovation in Information …, 2019 | 27 | 2019 |
Machine learning-based technique to detect SQL injection attack MA Azman, MF Marhusin, R Sulaiman Journal of Computer Science, 2021 | 25 | 2021 |
A comparative study on the advancement of text steganography techniques in digital media SS Baawi, MR Mokhtar, R Sulaiman ARPN J. Eng. Appl. Sci 13 (5), 1854-1863, 2018 | 25 | 2018 |
A survey on data carving in digital forensic N Alherbawi, Z Shukur, R Sulaiman Asian Journal of Information Technology 15 (24), 5137-5144, 2016 | 22 | 2016 |
New text steganography technique based on a set of two-letter words SS Baawi, MR Mokhtar, R Sulaiman Journal of Theoretical and Applied Information Technology 95 (22), 6247-6255, 2017 | 19 | 2017 |
A user protection model for the trusted computing environment MI Alshar'e, R Sulaiman, MR Mukhtar, AM Zin Journal of Computer Science 10 (9), 1692, 2014 | 17 | 2014 |
EVALUATION OF THE TPM USER AUTHENTICATION MODEL FOR TRUSTED COMPUTERS. M ALSHAR'E, AM Zin, R Sulaiman, MR Mokhtar Journal of Theoretical & Applied Information Technology 81 (2), 2015 | 15 | 2015 |
High-Security Image Steganography Technique using XNOR Operation and Fibonacci Algorithm AA Almayyahi, R Sulaiman, F Qamar, AE Hamzah International Journal of Advanced Computer Science and Applications 11 (10 …, 2020 | 13 | 2020 |
Design and Implementation of the TPM User Authentication Model. MI Alshar'e, R Sulaiman, MR Mokhtar, AM Zin J. Comput. Sci. 10 (11), 2299-2314, 2014 | 13 | 2014 |