If you made any changes in Pure these will be visible here soon.

Research Output 2007 2019

  • 82 Citations
  • 5 h-Index
  • 20 Article
  • 10 Conference contribution
Filter
Article
2019
Cryptography
Robots
Communication
Robotics
Managers
2018
1 Citation (Scopus)

A comparative study on the advancement of text steganography techniques in digital media

Baawi, S. S., Mokhtar, M. R. & Sulaiman, R., 1 Mar 2018, In : ARPN Journal of Engineering and Applied Sciences. 13, 5, p. 1854-1863 10 p.

Research output: Contribution to journalArticle

Steganography
Digital storage
Linguistics
Transparency
1 Citation (Scopus)

CryptoROS: A secure communication architecture for ROS-based applications

Amini, R., Sulaiman, R. & Abd Rahman Kurais, A. H., 1 Jan 2018, In : International Journal of Advanced Computer Science and Applications. 9, 10, p. 189-194 6 p.

Research output: Contribution to journalArticle

Robots
Secure communication
Cryptography

Protection of XML-based denail-of-service and httpflooding attacks in web services using the middleware tool

Alasri, A. & Sulaiman, R., 1 Jan 2018, In : International Journal of Engineering and Technology(UAE). 7, 4.7 Special Issue 7, p. 322-329 8 p.

Research output: Contribution to journalArticle

Middleware
XML
Web services
Hypermedia
HTTP
2017
2 Citations (Scopus)

Current techniques in JPEG image authentication and forgery detection

Alherbawi, N., Shukur, Z. & Sulaiman, R., 2017, In : Journal of Engineering and Applied Sciences. 12, 1, p. 104-112 9 p.

Research output: Contribution to journalArticle

Authentication
Image processing
Costs
Digital forensics
1 Citation (Scopus)

JPEG image classification in digital forensic via DCT coefficient analysis

Alherbawi, N., Shukur, Z. & Sulaiman, R., 4 Jul 2017, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-31 31 p.

Research output: Contribution to journalArticle

Image classification
Learning systems
Experiments
Digital forensics
1 Citation (Scopus)

New text steganography technique based on a set of two-letter words

Baawi, S. S., Mokhtar, M. R. & Sulaiman, R., 30 Nov 2017, In : Journal of Theoretical and Applied Information Technology. 95, 22, p. 6247-6255 9 p.

Research output: Contribution to journalArticle

Steganography
Cover
Information Hiding
Channel capacity
Zero
2016
1 Citation (Scopus)
Query processing
Query Processing
Cryptography
Encryption
Query
3 Citations (Scopus)

A survey on data carving in digital forensic

Alherbawi, N., Shukur, Z. & Sulaiman, R., 2016, In : Asian Journal of Information Technology. 15, 24, p. 5137-5144 8 p.

Research output: Contribution to journalArticle

literature review
resource
need
2015

A framework for a multi-layered security of an automated programming code assessment tool

Marhusin, M. F., Kafli, M. F. Z., Sulaiman, R., Ismail, S. & Abdullah, Z. H., 2015, In : Journal of Computer Science. 11, 2, p. 406-415 10 p.

Research output: Contribution to journalArticle

Students
Mobile devices
Data communication systems
Cryptography
Information technology
5 Citations (Scopus)

An improved LSB image steganography technique using bit-inverse in 24 bit colour image

Majeed, M. A. & Sulaiman, R., 20 Oct 2015, In : Journal of Theoretical and Applied Information Technology. 80, 2, p. 342-348 7 p.

Research output: Contribution to journalArticle

Steganography
Color Image
Color
Pixel
Pixels

Evaluation of the TPM user authentication model for trusted computers

Alshar’E, M., Mohd. Zin, A., Sulaiman, R. & Mokhtar, M. R., 1 Nov 2015, In : Journal of Theoretical and Applied Information Technology. 81, 2, p. 298-309 12 p.

Research output: Contribution to journalArticle

User Authentication
Authentication
Evaluation
Prototype
Module
2014
3 Citations (Scopus)

A user protection model for the trusted computing environment

Alshar'e, M. I., Sulaiman, R., Mukhtar, M. R. & Mohd. Zin, A., 2014, In : Journal of Computer Science. 10, 10, p. 1692-1702 11 p.

Research output: Contribution to journalArticle

Hardware security
Trusted computing
Loaders
Security of data
Authentication
1 Citation (Scopus)

Design and implementation of the TPM user authentication model

Alshar'e, M. I., Sulaiman, R., Mokhtar, M. R. & MohdZin, A., 2014, In : Journal of Computer Science. 10, 11, p. 2299-2314 16 p.

Research output: Contribution to journalArticle

Authentication
Hardware security
Biometrics
3 Citations (Scopus)

Multi-agent security architecture for a Sharia compliant e-auction

Rashid, N. A. M., Jailani, N., Sulaiman, R. & Abdullah, Z., 2014, In : Journal of Theoretical and Applied Information Technology. 70, 2, p. 345-355 11 p.

Research output: Contribution to journalArticle

Mobile agents
Auctions
Cryptography
Mobile Agent
Network protocols

Secure architecture for m-health communications using multi-agent approach

Jalil, M. F. A. & Sulaiman, R., 2014, In : Research Journal of Applied Sciences, Engineering and Technology. 7, 12, p. 2583-2588 6 p.

Research output: Contribution to journalArticle

Communication
Internet
Personal digital assistants
Electronic mail
Mobile phones
2012

Enhancing security in E-health communications using multi-agent system

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2012, In : Journal of Computer Science. 8, 5, p. 637-647 11 p.

Research output: Contribution to journalArticle

Multi agent systems
Health
Communication
Cryptography
2 Citations (Scopus)
Computer Networks
Disaster
Computer networks
Disasters
Network Traffic

Securing online communications using MLC and MAS in E- health

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., Sep 2012, In : Australian Journal of Basic and Applied Sciences. 6, 9, p. 588-604 17 p.

Research output: Contribution to journalArticle

Multi agent systems
Multilayers
Health
Communication
Automation
2011
2 Citations (Scopus)

A new security model using multilayer approach for E-health services

Sulaiman, R., Sharma, D., Ma, W. & Tran, D., 2011, In : Journal of Computer Science. 7, 11, p. 1691-1703 13 p.

Research output: Contribution to journalArticle

Multilayers
Health
Communication
Internet
Computer systems