Follow
Rossilawati Sulaiman
Title
Cited by
Cited by
Year
Lightweight encryption technique to enhance medical image security on internet of medical things applications
MK Hasan, S Islam, R Sulaiman, S Khan, AHA Hashim, S Habib, M Islam, ...
IEEE Access 9, 47731-47742, 2021
1692021
Students’ perception of mobile augmented reality applications in learning computer organization
NA Abd Majid, H Mohammed, R Sulaiman
Procedia-Social and Behavioral Sciences 176, 111-116, 2015
1182015
Cloud data encryption and authentication based on enhanced Merkle hash tree method.
JS Jayaprakash, K Balasubramanian, R Sulaiman, MK Hasan, ...
Computers, Materials & Continua 72 (1), 2022
592022
A review on text steganography techniques
MA Majeed, R Sulaiman, Z Shukur, MK Hasan
Mathematics 9 (21), 2829, 2021
542021
Social engineering attacks prevention: A systematic literature review
W Syafitri, Z Shukur, U Asma’Mokhtar, R Sulaiman, MA Ibrahim
IEEE access 10, 39325-39343, 2022
512022
Optimized leaky ReLU for handwritten Arabic character recognition using convolution neural networks
BH Nayef, SNHS Abdullah, R Sulaiman, ZAA Alyasseri
Multimedia Tools and Applications, 1-30, 2022
412022
AN IMPROVED LSB IMAGE STEGANOGRAPHY TECHNIQUE USING BIT-INVERSE IN 24 BIT COLOUR IMAGE.
MA Majeed, R Sulaiman
Journal of Theoretical & Applied Information Technology 80 (2), 2015
322015
Systematic literature review on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Procedia technology 11, 86-92, 2013
322013
A security architecture for e-health services
R Sulaiman, D Sharma, W Ma, D Tran
2008 10th International Conference on Advanced Communication Technology 2 …, 2008
292008
E-health services with secure mobile agent
R Sulaiman, X Huang, D Sharma
2009 seventh annual communication networks and services research conference …, 2009
282009
A conceptual and systematics for intelligent power management system-based cloud computing: Prospects, and challenges
AHA AL-Jumaili, YIA Mashhadany, R Sulaiman, ZAA Alyasseri
Applied Sciences 11 (21), 9820, 2021
262021
Issues and trends in information security policy compliance
SH Bhaharin, U Asma’Mokhtar, R Sulaiman, MM Yusof
2019 6th International Conference on Research and Innovation in Information …, 2019
252019
Machine learning-based technique to detect SQL injection attack
MA Azman, MF Marhusin, R Sulaiman
Journal of Computer Science, 2021
242021
A comparative study on the advancement of text steganography techniques in digital media
SS Baawi, MR Mokhtar, R Sulaiman
ARPN J. Eng. Appl. Sci 13 (5), 1855-1863, 2018
242018
A survey on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Asian Journal of Information Technology 15 (24), 5137-5144, 2016
222016
New text steganography technique based on a set of two-letter words
SS Baawi, MR Mokhtar, R Sulaiman
Journal of Theoretical and Applied Information Technology 95 (22), 6247-6255, 2017
192017
A user protection model for the trusted computing environment
MI Alshar'e, R Sulaiman, MR Mukhtar, AM Zin
Journal of Computer Science 10 (9), 1692, 2014
172014
EVALUATION OF THE TPM USER AUTHENTICATION MODEL FOR TRUSTED COMPUTERS.
M ALSHAR'E, AM Zin, R Sulaiman, MR Mokhtar
Journal of Theoretical & Applied Information Technology 81 (2), 2015
152015
Design and Implementation of the TPM User Authentication Model.
MI Alshar'e, R Sulaiman, MR Mokhtar, AM Zin
J. Comput. Sci. 10 (11), 2299-2314, 2014
132014
Enhancing security in e-health services using agent
R Sulaiman, D Sharma
Proceedings of the 2011 International Conference on Electrical Engineering …, 2011
132011
The system can't perform the operation now. Try again later.
Articles 1–20