Digital audio steganography: Systematic review, classification, and analysis of the current state of the art AA AlSabhany, AH Ali, F Ridzuan, AH Azni, MR Mokhtar Computer Science Review 38, 100316, 2020 | 62 | 2020 |
Performance analysis of routing protocol for WSN using data centric approach AH Azni, MM Saudi, A Azman, AS Johari World Academy of Science, Engineering and Technology 53, 2009 | 33 | 2009 |
Correlated node behavior model based on semi Markov process for MANETS AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin arXiv preprint arXiv:1203.4319, 2012 | 29 | 2012 |
The adaptive multi-level phase coding method in audio steganography AA Alsabhany, F Ridzuan, AH Azni IEEE Access 7, 129291-129306, 2019 | 28 | 2019 |
Bluetooth mobile advertising system using pull-based approach AH Halim, AH Fauzi, S Tarmizi 2008 International Symposium on Information Technology 4, 1-4, 2008 | 24 | 2008 |
Systematic review for network survivability analysis in MANETS AH Azni, R Ahmad, ZAM Noh, F Hazwani, N Hayaati Procedia-Social and Behavioral Sciences 195, 1872-1881, 2015 | 22 | 2015 |
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud IEEE Access 8, 198646-198658, 2020 | 16 | 2020 |
Denial of service:(DoS) Impact on sensors M Daud, R Rasiah, M George, D Asirvatham, AFA Rahman, A Ab Halim 2018 4th International Conference on Information Management (ICIM), 270-274, 2018 | 15 | 2018 |
Survivability modeling and analysis of mobile ad hoc network with correlated node behavior AH Azni, R Ahmad, ZAM Noh Procedia Engineering 53, 435-440, 2013 | 12 | 2013 |
Analysis of Packets Abnormalities in Wireless Sensor Network AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar 2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009 | 12 | 2009 |
The progressive multilevel embedding method for audio steganography AA Alsabhany, F Ridzuan, AH Azni Journal of physics: conference series 1551 (1), 012011, 2020 | 11 | 2020 |
Visual perception games for autistic learners: Design & development CKNCK Mohd, F Shahbodin, Z Jano, AH Azni Proceedings of the 2019 Asia Pacific Information Technology Conference, 5-11, 2019 | 11 | 2019 |
Extracting software features from online reviews to demonstrate requirements reuse in software engineering NH Bakar, ZM Kasirun, N Salleh, AHA Halim Proceedings of the International Conference on Computing & Informatics, 184-190, 2017 | 11 | 2017 |
MAC protocol to reduce packet collision in wireless sensor network AHA Halim, K Zen 2008 International Conference on Computer and Communication Engineering …, 2008 | 10 | 2008 |
LAO-3D: a symmetric lightweight block cipher based on 3d permutation for mobile encryption application AA Zakaria, AH Ab Halim, F Ridzuan, NH Zakaria, M Daud Symmetry 14 (10), 2042, 2022 | 9 | 2022 |
Epidermic modelling for correlated node behavior in ad hoc networks AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin International Journal of Chaotic Computing 1 (1), 22-30, 2013 | 9 | 2013 |
Systematic literature review: trend analysis on the design of lightweight block cipher AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud Journal of King Saud University-Computer and Information Sciences 35 (5), 101550, 2023 | 8 | 2023 |
Measuring sensor to cloud energy consumption AH Azni, AFA Rahman, NHM Alwi, K Seman Proceedings of the Second International Conference on Internet of things …, 2017 | 8 | 2017 |
Factors influencing knowledge sharing in higher learning AH Azni, AA Baker, N Shah, H Abd Hamid 2010 International Symposium on Information Technology 3, 1606-1609, 2010 | 8 | 2010 |
A theoretical comparative analysis of DNA techniques used in dna based cryptography NAN Abdullah, NH Zakaria, AH Ab Halim, FHM Ridzuan, A Ahmad, ... Journal of Sustainability Science and Management 17 (5), 165-178, 2022 | 7 | 2022 |