If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

  • 78 Citations
  • 5 h-Index
  • 19 Article
  • 10 Conference contribution
2019

A Two-stage Malware Detection Architecture Inspired by Human Immune System

Salah, M. A. F., Fadzli Marhusin, M. & Sulaiman, R., 25 Jan 2019, Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. Abidin, K. A. Z., Mohd, M. & Shukur, Z. (eds.). Institute of Electrical and Electronics Engineers Inc., 8626867. (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Immune system
privacy
integrity
threat
Detectors
1 Citation (Scopus)

Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique

Baawi, S. S., Mokhtar, M. R. & Sulaiman, R., 1 Jan 2019, Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Mohammed, F., Saeed, F., Gazem, N. & Busalim, A. (eds.). Springer Verlag, p. 525-537 13 p. (Advances in Intelligent Systems and Computing; vol. 843).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Experiments
2018
1 Citation (Scopus)

A comparative study on the advancement of text steganography techniques in digital media

Baawi, S. S., Mokhtar, M. R. & Sulaiman, R., 1 Mar 2018, In : ARPN Journal of Engineering and Applied Sciences. 13, 5, p. 1854-1863 10 p.

Research output: Contribution to journalArticle

Steganography
Digital storage
Linguistics
Transparency

CryptoROS: A secure communication architecture for ROS-based applications

Amini, R., Sulaiman, R. & Abd Rahman Kurais, A. H., 1 Jan 2018, In : International Journal of Advanced Computer Science and Applications. 9, 10, p. 189-194 6 p.

Research output: Contribution to journalArticle

Robots
Secure communication
Cryptography

Implementation of AES algorithm in QGIS software

Ghaleb, H. S. M., Shukur, Z., Sulaiman, R. & Mobidin, H. S., 9 Mar 2018, Proceedings of the 2017 6th International Conference on Electrical Engineering and Informatics: Sustainable Society Through Digital Innovation, ICEEI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-November. p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographic Information Systems
Geographic information systems
Encryption
Cryptography
Duplication

Information leakage preventive training

Bakar, N. A., Mohd, M. & Sulaiman, R., 9 Mar 2018, Proceedings of the 2017 6th International Conference on Electrical Engineering and Informatics: Sustainable Society Through Digital Innovation, ICEEI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-November. p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malaysia
Electronic mail
Electronic Mail
Leakage
Technology

Protection of XML-based denail-of-service and httpflooding attacks in web services using the middleware tool

Alasri, A. & Sulaiman, R., 1 Jan 2018, In : International Journal of Engineering and Technology(UAE). 7, 4.7 Special Issue 7, p. 322-329 8 p.

Research output: Contribution to journalArticle

Middleware
XML
Web services
Hypermedia
HTTP
2017
2 Citations (Scopus)

Current techniques in JPEG image authentication and forgery detection

Alherbawi, N., Shukur, Z. & Sulaiman, R., 2017, In : Journal of Engineering and Applied Sciences. 12, 1, p. 104-112 9 p.

Research output: Contribution to journalArticle

Authentication
Image processing
Costs
Digital forensics
1 Citation (Scopus)

JPEG image classification in digital forensic via DCT coefficient analysis

Alherbawi, N., Shukur, Z. & Sulaiman, R., 4 Jul 2017, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-31 31 p.

Research output: Contribution to journalArticle

Image classification
Learning systems
Experiments
Digital forensics
1 Citation (Scopus)

New text steganography technique based on a set of two-letter words

Baawi, S. S., Mokhtar, M. R. & Sulaiman, R., 30 Nov 2017, In : Journal of Theoretical and Applied Information Technology. 95, 22, p. 6247-6255 9 p.

Research output: Contribution to journalArticle

Steganography
Cover
Information Hiding
Channel capacity
Zero
2016
1 Citation (Scopus)
Query processing
Query Processing
Cryptography
Encryption
Query
3 Citations (Scopus)

A survey on data carving in digital forensic

Alherbawi, N., Shukur, Z. & Sulaiman, R., 2016, In : Asian Journal of Information Technology. 15, 24, p. 5137-5144 8 p.

Research output: Contribution to journalArticle

literature review
resource
need
2015

A framework for a multi-layered security of an automated programming code assessment tool

Marhusin, M. F., Kafli, M. F. Z., Sulaiman, R., Ismail, S. & Abdullah, Z. H., 2015, In : Journal of Computer Science. 11, 2, p. 406-415 10 p.

Research output: Contribution to journalArticle

Students
Mobile devices
Data communication systems
Cryptography
Information technology
5 Citations (Scopus)

An improved LSB image steganography technique using bit-inverse in 24 bit colour image

Majeed, M. A. & Sulaiman, R., 20 Oct 2015, In : Journal of Theoretical and Applied Information Technology. 80, 2, p. 342-348 7 p.

Research output: Contribution to journalArticle

Steganography
Color Image
Color
Pixel
Pixels

Evaluation of the TPM user authentication model for trusted computers

Alshar’E, M., Mohd. Zin, A., Sulaiman, R. & Mokhtar, M. R., 1 Nov 2015, In : Journal of Theoretical and Applied Information Technology. 81, 2, p. 298-309 12 p.

Research output: Contribution to journalArticle

User Authentication
Authentication
Evaluation
Prototype
Module
2 Citations (Scopus)

Following the Wi-Fi breadcrumbs: Network based mobile application privacy threats

Kennedy, M. & Sulaiman, R., 10 Dec 2015, Proceedings - 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015. Institute of Electrical and Electronics Engineers Inc., p. 265-270 6 p. 7352508

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wi-Fi
Defects
Authentication
Cryptography
Wireless networks
2014
3 Citations (Scopus)

A user protection model for the trusted computing environment

Alshar'e, M. I., Sulaiman, R., Mukhtar, M. R. & Mohd. Zin, A., 2014, In : Journal of Computer Science. 10, 10, p. 1692-1702 11 p.

Research output: Contribution to journalArticle

Hardware security
Trusted computing
Loaders
Security of data
Authentication
1 Citation (Scopus)

Design and implementation of the TPM user authentication model

Alshar'e, M. I., Sulaiman, R., Mokhtar, M. R. & MohdZin, A., 2014, In : Journal of Computer Science. 10, 11, p. 2299-2314 16 p.

Research output: Contribution to journalArticle

Authentication
Hardware security
Biometrics
3 Citations (Scopus)

Multi-agent security architecture for a Sharia compliant e-auction

Rashid, N. A. M., Jailani, N., Sulaiman, R. & Abdullah, Z., 2014, In : Journal of Theoretical and Applied Information Technology. 70, 2, p. 345-355 11 p.

Research output: Contribution to journalArticle

Mobile agents
Auctions
Cryptography
Mobile Agent
Network protocols

Secure architecture for m-health communications using multi-agent approach

Jalil, M. F. A. & Sulaiman, R., 2014, In : Research Journal of Applied Sciences, Engineering and Technology. 7, 12, p. 2583-2588 6 p.

Research output: Contribution to journalArticle

Communication
Internet
Personal digital assistants
Electronic mail
Mobile phones
2012

Enhancing security in E-health communications using multi-agent system

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2012, In : Journal of Computer Science. 8, 5, p. 637-647 11 p.

Research output: Contribution to journalArticle

Multi agent systems
Health
Communication
Cryptography
2 Citations (Scopus)
Computer Networks
Disaster
Computer networks
Disasters
Network Traffic

Securing online communications using MLC and MAS in E- health

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., Sep 2012, In : Australian Journal of Basic and Applied Sciences. 6, 9, p. 588-604 17 p.

Research output: Contribution to journalArticle

Multi agent systems
Multilayers
Health
Communication
Automation
2011
2 Citations (Scopus)

A new security model using multilayer approach for E-health services

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2011, In : Journal of Computer Science. 7, 11, p. 1691-1703 13 p.

Research output: Contribution to journalArticle

Multilayers
Health
Communication
Internet
Computer systems
9 Citations (Scopus)

Enhancing security in E-health services using agent

Sulaiman, R. & Sharma, D., 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011. 6021580

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Health
Internet
Communication
Personal digital assistants
2009
6 Citations (Scopus)

A multi-agent security architecture

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2009, NSS 2009 - Network and System Security. p. 184-191 8 p. 5318910

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Electronic document identification systems
Mobile agents
Communication
Multilayers
13 Citations (Scopus)

E-health services with secure mobile agent

Sulaiman, R., Huang, X. & Sharma, D., 2009, Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009. p. 270-277 8 p. 4939137

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Health
Communication
Cryptography
Multilayers
2008
16 Citations (Scopus)

A security architecture for e-health services

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2008, International Conference on Advanced Communication Technology, ICACT. Vol. 2. p. 999-1004 6 p. 4493935

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Communication
Cryptography
2007
6 Citations (Scopus)

A multi-agent security framework for e-health services

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Vol. 4693 LNAI. p. 547-554 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4693 LNAI, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health Services
Communication
Health
Privacy
Technology