Research Output per year
Fingerprint Fingerprint is based on mining the text of the person's scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.
- 3 Similar Profiles
Steganography
Engineering & Materials Science
Authentication
Engineering & Materials Science
Orthogonal Frequency Division multiplexing (OFDM)
Mathematics
Orthogonal frequency division multiplexing
Engineering & Materials Science
Computer networks
Engineering & Materials Science
Software agents
Engineering & Materials Science
Industry
Engineering & Materials Science
Bayesian networks
Engineering & Materials Science
Network
Recent external collaboration on country level. Dive into details by clicking on the dots.
Research Output 2007 2019
Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique
Baawi, S. S., Mokhtar, M. R. & Sulaiman, R., 1 Jan 2019, Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Mohammed, F., Saeed, F., Gazem, N. & Busalim, A. (eds.). Springer Verlag, p. 525-537 13 p. (Advances in Intelligent Systems and Computing; vol. 843).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Steganography
Experiments
3C-CSIRT model a sustainable national CSIRT for Afghanistan
Jalal, I., Shukur, Z. & Mokhtar, M. R., 9 Mar 2018, Proceedings of the 2017 6th International Conference on Electrical Engineering and Informatics: Sustainable Society Through Digital Innovation, ICEEI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-November. p. 1-4 4 p.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Afghanistan
Emergency Response
Emergencies
Organizational Models
Financial Management
A comparative study on the advancement of text steganography techniques in digital media
Baawi, S. S., Mokhtar, M. R. & Sulaiman, R., 1 Mar 2018, In : ARPN Journal of Engineering and Applied Sciences. 13, 5, p. 1854-1863 10 p.Research output: Contribution to journal › Article
Steganography
Digital storage
Linguistics
Transparency
A model for Afghanistan's cyber security incident response team
Jalal, I., Mohd. Yusof, M., Shukur, Z. & Mokhtar, M. R., 1 Jan 2018, In : International Journal on Advanced Science, Engineering and Information Technology. 8, 6, p. 2620-2626 7 p.Research output: Contribution to journal › Article
Computer Security
Afghanistan
Organizational Models
Security Measures
funding
Embedded feature selection method for a network-level behavioural analysis detection model
Mohd Yusof, M. H., Mokhtar, M. R., Mohd. Zin, A. & Maple, C., 1 Jan 2018, In : International Journal of Advanced Computer Science and Applications. 9, 12, p. 509-517 9 p.Research output: Contribution to journal › Article
Intrusion detection
Feature extraction
Computer applications
Bayesian networks
Computer science