Rabiah Ahmad, Ahmad R, R Ahmad
Rabiah Ahmad, Ahmad R, R Ahmad
Information Security And Networking Research Group Universiti Teknikal Malaysia Melaka - UTeM
E-mail confirmado em utem.edu.my - Página inicial
Título
Citado por
Citado por
Ano
Objectively measured physical capability levels and mortality: systematic review and meta-analysis
R Cooper, D Kuh, R Hardy
Bmj 341, 2010
8752010
A genetic-algorithm-based approach for audio steganography
M Zamani, AA Manaf, RB Ahmad, AM Zeki, S Abdullah
World Academy of Science, Engineering and Technology 54 (360-363), 2, 2009
902009
A biometric-based security for data authentication in wireless body area network (wban)
SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz
2013 15th international conference on advanced communications technology …, 2013
852013
Security threats categories in healthcare information systems
G Narayana Samy, R Ahmad, Z Ismail
Health informatics journal 16 (3), 201-209, 2010
852010
A secure audio steganography approach
M Zamani, ABA Manaf, RB Ahmad, F Jaryani, H Taherdoost, AM Zeki
2009 International Conference for Internet Technology and Secured …, 2009
752009
Surveying the wireless body area network in the realm of wireless communication
SN Ramli, R Ahmad
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
692011
A conceptual framework of info structure for information security risk assessment (ISRA)
P Shamala, R Ahmad, M Yusoff
Journal of Information Security and Applications 18 (1), 45-52, 2013
642013
Identification of risk factors for 15-year mortality among community-dwelling older people using Cox regression and a genetic algorithm
R Ahmad, PA Bath
The Journals of Gerontology Series A: Biological Sciences and Medical …, 2005
532005
Robust audio steganography via genetic algorithm
M Zamani, H Taherdoost, AA Manaf, RB Ahmad, AM Zeki
2009 International Conference on Information and Communication Technologies …, 2009
512009
An approach to improve the robustness of substitution techniques of audio steganography
M Zamani, RB Ahmad, ABA Manaf, AM Zeki
2009 2nd IEEE International Conference on Computer Science and Information …, 2009
492009
Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems
KHA Mohammed Nasser Al-Mhiqani, Rabiah Ahmad Author, Warusia Yassin Author ...
International Journal of Advanced Computer Science and Applications (IJACSA …, 2018
43*2018
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
422011
A dynamic cyber terrorism framework
R Ahmad, Z Yunos
International Journal of Computer Science and Information Security 10 (2), 149, 2012
402012
Integrating information quality dimensions into information security risk management (ISRM)
P Shamala, R Ahmad, A Zolait, M Sedek
Journal of Information Security and Applications 36, 1-10, 2017
392017
Threats to health information security
GN Samy, R Ahmad, Z Ismail
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
392009
Knots of substitution techniques of audio steganography
M Zamani, AA Manaf, R Ahmad
The 2009 International Conference on Telecom Technology and Applications …, 2009
352009
A novel approach for audio watermarking
M Zamani, ABA Manaf, RB Ahmad, AM Zeki, P Magalingam
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
332009
A novel approach for genetic audio watermarking
M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, SS Chaeikar, ...
Journal of Information Assurance and Security 5 (1), 102-111, 2010
322010
An artificial-intelligence-based approach for audio steganography
M Zamani, H Taherdoost, AA Manaf, RB Ahmad, AM Zeki
MASAUM Journal of Open Probelms in Science and Engineering (MJOPSE) 1 (1), 64-68, 2009
322009
Forensics readiness for wireless body area network (WBAN) system
AFA Rahman, R Ahmad, SN Ramli
16th International Conference on Advanced Communication Technology, 177-180, 2014
312014
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20