Objectively measured physical capability levels and mortality: systematic review and meta-analysis R Cooper, D Kuh, R Hardy, Mortality Review Group Bmj 341, 2010 | 1260 | 2010 |
Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems KHA Mohammed Nasser Al-Mhiqani, Rabiah Ahmad Author, Warusia Yassin Author ... International Journal of Advanced Computer Science and Applications (IJACSA …, 2018 | 126* | 2018 |
Security threats categories in healthcare information systems G Narayana Samy, R Ahmad, Z Ismail Health informatics journal 16 (3), 201-209, 2010 | 124 | 2010 |
A biometric-based security for data authentication in wireless body area network (wban) SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz 2013 15th international conference on advanced communications technology …, 2013 | 110 | 2013 |
Integrating information quality dimensions into information security risk management (ISRM) P Shamala, R Ahmad, A Zolait, M Sedek Journal of Information Security and Applications 36, 1-10, 2017 | 106 | 2017 |
A conceptual framework of info structure for information security risk assessment (ISRA) P Shamala, R Ahmad, M Yusoff Journal of Information Security and Applications 18 (1), 45-52, 2013 | 103 | 2013 |
A genetic-algorithm-based approach for audio steganography M Zamani, AA Manaf, RB Ahmad, AM Zeki, S Abdullah International Journal of Computer and Information Engineering 3 (6), 1562-1565, 2009 | 97 | 2009 |
Surveying the wireless body area network in the realm of wireless communication SN Ramli, R Ahmad 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 96 | 2011 |
A secure audio steganography approach M Zamani, ABA Manaf, RB Ahmad, F Jaryani, H Taherdoost, AM Zeki 2009 International Conference for Internet Technology and Secured …, 2009 | 95 | 2009 |
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ... Applied Sciences 10 (15), 5208, 2020 | 88 | 2020 |
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud Malaysian Technical Universities International Conference on Engineering …, 2011 | 65 | 2011 |
A new intelligent multilayer framework for insider threat detection MN Al-Mhiqani, R Ahmad, ZZ Abidin, KH Abdulkareem, MA Mohammed, ... Computers & Electrical Engineering 97, 107597, 2022 | 64 | 2022 |
Robust audio steganography via genetic algorithm M Zamani, H Taherdoost, AA Manaf, RB Ahmad, AM Zeki 2009 International Conference on Information and Communication Technologies …, 2009 | 61 | 2009 |
A dynamic cyber terrorism framework R Ahmad, Z Yunos International Journal of Computer Science and Information Security 10 (2), 149, 2012 | 60 | 2012 |
Identification of risk factors for 15-year mortality among community-dwelling older people using Cox regression and a genetic algorithm R Ahmad, PA Bath The Journals of Gerontology Series A: Biological Sciences and Medical …, 2005 | 57 | 2005 |
Threats to health information security GN Samy, R Ahmad, Z Ismail 2009 Fifth International Conference on Information Assurance and Security 2 …, 2009 | 56 | 2009 |
An approach to improve the robustness of substitution techniques of audio steganography M Zamani, RB Ahmad, ABA Manaf, AM Zeki 2009 2nd IEEE International Conference on Computer Science and Information …, 2009 | 52 | 2009 |
A novel approach for genetic audio watermarking M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, SS Chaeikar, ... Journal of Information Assurance and Security 5 (1), 102-111, 2010 | 43 | 2010 |
Knots of substitution techniques of audio steganography M Zamani, AA Manaf, R Ahmad The 2009 International Conference on Telecom Technology and Applications …, 2009 | 43 | 2009 |
Perception on cyber terrorism: A focus group discussion approach R Ahmad, Z Yunos, S Sahib, M Yusoff Scientific Research Publishing, 2012 | 38 | 2012 |