If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

  • 82 Citations
  • 5 h-Index
  • 20 Article
  • 10 Conference contribution
Filter
Conference contribution
2019

A Two-stage Malware Detection Architecture Inspired by Human Immune System

Salah, M. A. F., Fadzli Marhusin, M. & Sulaiman, R., 25 Jan 2019, Proceedings of the 2018 Cyber Resilience Conference, CRC 2018. Abidin, K. A. Z., Mohd, M. & Shukur, Z. (eds.). Institute of Electrical and Electronics Engineers Inc., 8626867. (Proceedings of the 2018 Cyber Resilience Conference, CRC 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Immune system
privacy
integrity
threat
Detectors
2 Citations (Scopus)

Enhancement of text steganography technique using Lempel-Ziv-Welch algorithm and two-letter word technique

Baawi, S. S., Mokhtar, M. R. & Sulaiman, R., 1 Jan 2019, Recent Trends in Data Science and Soft Computing - Proceedings of the 3rd International Conference of Reliable Information and Communication Technology IRICT 2018. Mohammed, F., Saeed, F., Gazem, N. & Busalim, A. (eds.). Springer Verlag, p. 525-537 13 p. (Advances in Intelligent Systems and Computing; vol. 843).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Steganography
Experiments
2018

Implementation of AES algorithm in QGIS software

Ghaleb, H. S. M., Shukur, Z., Sulaiman, R. & Mobidin, H. S., 9 Mar 2018, Proceedings of the 2017 6th International Conference on Electrical Engineering and Informatics: Sustainable Society Through Digital Innovation, ICEEI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-November. p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographic Information Systems
Geographic information systems
Encryption
Cryptography
Duplication

Information leakage preventive training

Bakar, N. A., Mohd, M. & Sulaiman, R., 9 Mar 2018, Proceedings of the 2017 6th International Conference on Electrical Engineering and Informatics: Sustainable Society Through Digital Innovation, ICEEI 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2017-November. p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malaysia
Electronic mail
Electronic Mail
Leakage
Technology
2015
3 Citations (Scopus)

Following the Wi-Fi breadcrumbs: Network based mobile application privacy threats

Kennedy, M. & Sulaiman, R., 10 Dec 2015, Proceedings - 5th International Conference on Electrical Engineering and Informatics: Bridging the Knowledge between Academic, Industry, and Community, ICEEI 2015. Institute of Electrical and Electronics Engineers Inc., p. 265-270 6 p. 7352508

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wi-Fi
Defects
Authentication
Cryptography
Wireless networks
2011
9 Citations (Scopus)

Enhancing security in E-health services using agent

Sulaiman, R. & Sharma, D., 2011, Proceedings of the 2011 International Conference on Electrical Engineering and Informatics, ICEEI 2011. 6021580

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Health
Internet
Communication
Personal digital assistants
2009
6 Citations (Scopus)

A multi-agent security architecture

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2009, NSS 2009 - Network and System Security. p. 184-191 8 p. 5318910

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Electronic document identification systems
Mobile agents
Communication
Multilayers
14 Citations (Scopus)

E-health services with secure mobile agent

Sulaiman, R., Huang, X. & Sharma, D., 2009, Proceedings of the 7th Annual Communication Networks and Services Research Conference, CNSR 2009. p. 270-277 8 p. 4939137

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Health
Communication
Cryptography
Multilayers
2008
16 Citations (Scopus)

A security architecture for e-health services

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2008, International Conference on Advanced Communication Technology, ICACT. Vol. 2. p. 999-1004 6 p. 4493935

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health
Communication
Cryptography
2007
6 Citations (Scopus)

A multi-agent security framework for e-health services

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2007, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 2 ed. Vol. 4693 LNAI. p. 547-554 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4693 LNAI, no. PART 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health Services
Communication
Health
Privacy
Technology