Bit-pattern based integral attack MR Z’aba, H Raddum, M Henricksen, E Dawson Fast Software Encryption: 15th International Workshop, FSE 2008, Lausanne …, 2008 | 100 | 2008 |
Comprehensive survey of machine learning approaches in cognitive radio-based vehicular ad hoc networks MA Hossain, RM Noor, KLA Yau, SR Azzuhri, MR Z’aba, I Ahmedy IEEE Access 8, 78054-78108, 2020 | 68 | 2020 |
Construction of cryptographically strong S-boxes inspired by bee waggle dance H Isa, N Jamil, MR Z’aba New generation computing 34, 221-238, 2016 | 44 | 2016 |
Threat modeling approaches for securing cloud computin A Amini, N Jamil, AR Ahmad, MR Zaba Journal of Applied Sciences 15 (7), 953-967, 2015 | 37 | 2015 |
A survey of lightweight cryptographic hash function BT Hammad, N Jamil, ME Rusli, MR Z’aba Inter. J. Sci. Eng. Res 8, 806-814, 2017 | 32 | 2017 |
Capacity and frequency optimization of wireless backhaul network using traffic forecasting A Mahmood, MLM Kiah, MR Z’aba, AN Qureshi, MSS Kassim, ZHA Hasan, ... IEEE Access 8, 23264-23276, 2020 | 28 | 2020 |
Analysis of linear relationships in block ciphers MR Z'aba Queensland University of Technology, 2010 | 28 | 2010 |
Machine learning-based cooperative spectrum sensing in dynamic segmentation enabled cognitive radio vehicular network MA Hossain, R Md Noor, KLA Yau, SR Azzuhri, MR Z’aba, I Ahmedy, ... Energies 14 (4), 1169, 2021 | 27 | 2021 |
I-PRESENTTM: An Involutive Lightweight Block Cipher MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir Journal of Information Security 2014, 2014 | 27 | 2014 |
Implementation of PRINCE algorithm in FPGA YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq Proceedings of the 6th International Conference on Information Technology …, 2014 | 24 | 2014 |
Adapted stream region for packet marking based on DDoS attack detection in vehicular ad hoc networks R Kolandaisamy, RM Noor, MR Z’aba, I Ahmedy, I Kolandaisamy The Journal of Supercomputing 76 (8), 5948-5970, 2020 | 22 | 2020 |
Authenticated encryption schemes: A systematic review MA Jimale, MR Z’aba, MLBM Kiah, MYI Idris, N Jamil, MS Mohamad, ... IEEE Access 10, 14739-14766, 2022 | 20 | 2022 |
Spectrum sensing challenges & their solutions in cognitive radio based vehicular networks MA Hossain, R Md Noor, SR Azzuhri, MR Z'aba, I Ahmedy, KLA Yau, ... International Journal of Communication Systems 34 (7), e4748, 2021 | 20 | 2021 |
AES: Current security and efficiency analysis of its alternatives H Isa, I Bahari, H Sufian, MR Z'aba 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 19 | 2011 |
S-box construction from non-permutation power functions H Isa, N Jamil, MR Z'aba Proceedings of the 6th International Conference on Security of Information …, 2013 | 18 | 2013 |
Structured encryption for conceptual graphs GS Poh, MS Mohamad, MR Z’aba International Workshop on Security, 105-122, 2012 | 16 | 2012 |
IMPLEMENTATION OF LIGHTWEIGHT CRYPTOGRAPHIC PRIMITIVES. BT Hammad, N Jamil, ME Rusli, MR Z'ABA, IT Ahmed Journal of Theoretical & Applied Information Technology 95 (19), 2017 | 15 | 2017 |
Hybrid heuristic methods in constructing cryptographically strong S-boxes H Isa, N Jamil, M Z’aba Int. J. Cryptol. Res 6 (1), 1-15, 2016 | 15 | 2016 |
PRINCE IP-core on field programmable gate arrays (FPGA) YA Abbas, R Jidin, N Jamil, ME Rusli Research Journal of Applied Sciences, Engineering and Technology 10 (8), 914-922, 2015 | 10 | 2015 |
A survey on the cryptanalysis of the advanced encryption standard MR Z’aba, MA Maarof Proceedings of the postgraduate annual research seminar, 97-102, 2006 | 10 | 2006 |