An overview of principal component analysis S Karamizadeh, SM Abdullah, AA Manaf, M Zamani, A Hooman Journal of Signal and Information Processing 4 (3B), 173, 2013 | 194 | 2013 |
A genetic-algorithm-based approach for audio steganography M Zamani, AA Manaf, RB Ahmad, AM Zeki, S Abdullah World Academy of Science, Engineering and Technology 54 (360-363), 2, 2009 | 90 | 2009 |
Advantage and drawback of support vector machine functionality S Karamizadeh, SM Abdullah, M Halimi, J Shayan, M javad Rajabi 2014 international conference on computer, communications, and control …, 2014 | 76 | 2014 |
A robust video watermarking technique for the tamper detection of surveillance systems F Arab, SM Abdullah, SZM Hashim, AA Manaf, M Zamani Multimedia Tools and Applications 75 (18), 10855-10885, 2016 | 35 | 2016 |
Capacity and quality improvement in reversible image watermarking approach SM Abdullah, AA Manaf, M Zamani The 6th International Conference on Networked Computing and Advanced …, 2010 | 35 | 2010 |
A taxonomy of SQL injection attacks A Sadeghian, M Zamani, SM Abdullah 2013 International Conference on Informatics and Creative Multimedia, 269-273, 2013 | 34 | 2013 |
An overview on audio steganography techniques M Zamani, ABA Manaf, SM Abdullah International Journal of Digital Content Technology and Its Applications 6 (13), 2012 | 33 | 2012 |
Study of the effect DCT and DWT domains on the imperceptibility and robustness of Genetic watermarking A Shaamala, SM Abdullah, AA Manaf International Journal of Computer Science Issues (IJCSI) 8 (5), 220, 2011 | 32 | 2011 |
Correlation between PSNR and bit per sample rate in audio steganography M Zamani, ABA Manaf, SM Abdullah, SS Chaeikar 11th International Conference on Signal Processing (SIP'12), 163-168, 2012 | 30 | 2012 |
Review of recent detection methods for HTTP DDoS attack GA Jaafar, SM Abdullah, S Ismail Journal of Computer Networks and Communications 2019, 2019 | 29 | 2019 |
RETRACTED ARTICLE: Temperature-based estimation of global solar radiation using soft computing methodologies K Mohammadi, S Shamshirband, AS Danesh, MS Abdullah, M Zamani Theoretical and applied climatology 125 (1), 101-112, 2016 | 27 | 2016 |
Recursive reversible image watermarking using enhancement of difference expansion techniques SM Abdullah, AA Manaf, M Zamani Journal of Information Security Research 1 (2), 64-70, 2010 | 26 | 2010 |
Genetic algorithm as an approach to resolve the problems of substitution techniques of audio steganography M Zamani | 26 | 2009 |
Mazdak technique for PSNR estimation in audio steganography Z Mazdak, BAM Azizah, MA Shahidan, SC Saman Applied Mechanics and Materials 229, 2798-2803, 2012 | 25 | 2012 |
Face recognition using principle component analysis (PCA) and linear discriminant analysis (LDA) M Zainudin, H Radi, S Abdullah, RA Rahim, M Ismail, MI Idris, ... International Journal of Electrical & Computer Sciences 12 (05), 50-55, 2012 | 22 | 2012 |
A confidential RFID model to prevent unauthorized access M Gharooni, M Zamani, M Mansourizadeh, S Abdullah 2011 5th International Conference on Application of Information and …, 2011 | 22 | 2011 |
Vibrational studies of calcium magnesium ultraphosphate glasses R Hussin, MA Salim, NS Alias, MS Abdullah, S Abdullah, SAA Fuzi, ... Malaysian Journal of Fundamental and Applied Sciences 5 (1), 2009 | 22 | 2009 |
Pattern recognition techniques: studies on appropriate classifications S Karamizadeh, SM Abdullah, M Zamani, A Kherikhah Advanced Computer and Communication Engineering Technology, 791-799, 2015 | 21 | 2015 |
Efficient embedding for audio steganography M Zamani, ABA Manaf, SM Abdullah 2nd International Conference on Environment, Economics, Energy, Devices …, 2012 | 21 | 2012 |
Experimental studies of the ZigBee frequency agility mechanism in home area networks MA Sarijari, MS Abdullah, A Lo, RA Rashid 39th Annual IEEE Conference on Local Computer Networks Workshops, 711-717, 2014 | 20 | 2014 |