Rabiah Ahmad, Ahmad R, R Ahmad
Rabiah Ahmad, Ahmad R, R Ahmad
Information Security And Networking Research Group Universiti Teknikal Malaysia Melaka - UTeM
Verified email at utem.edu.my - Homepage
Title
Cited by
Cited by
Year
Objectively measured physical capability levels and mortality: systematic review and meta-analysis
R Cooper, D Kuh, R Hardy
Bmj 341, c4467, 2010
8612010
Security threats categories in healthcare information systems
G Narayana Samy, R Ahmad, Z Ismail
Health informatics journal 16 (3), 201-209, 2010
822010
A biometric-based security for data authentication in wireless body area network (wban)
SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz
2013 15th International Conference on Advanced Communications Technology …, 2013
812013
A secure audio steganography approach
M Zamani, ABA Manaf, RB Ahmad, F Jaryani, H Taherdoost, AM Zeki
2009 International Conference for Internet Technology and Secured …, 2009
732009
A genetic-algorithm-based approach for audio steganography
M Zamani, AA Manaf, R Ahmad, AM Zeki, S Abdullah
World Academy of Science, Engineering and Technology 54 (360-363), 2, 2009
732009
Surveying the wireless body area network in the realm of wireless communication
SN Ramli, R Ahmad
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
662011
A conceptual framework of info structure for information security risk assessment (ISRA)
P Shamala, R Ahmad, M Yusoff
Journal of Information Security and Applications 18 (1), 45-52, 2013
652013
Identification of risk factors for 15-year mortality among community-dwelling older people using Cox regression and a genetic algorithm
R Ahmad, PA Bath
The Journals of Gerontology Series A: Biological Sciences and Medical …, 2005
532005
Robust audio steganography via genetic algorithm
M Zamani, H Taherdoost, AA Manaf, RB Ahmad, AM Zeki
2009 International Conference on Information and Communication Technologies …, 2009
482009
An approach to improve the robustness of substitution techniques of audio steganography
M Zamani, RB Ahmad, ABA Manaf, AM Zeki
2009 2nd IEEE International Conference on Computer Science and Information …, 2009
462009
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
422011
A dynamic cyber terrorism framework
R Ahmad, Z Yunos
International Journal of Computer Science and Information Security 10 (2), 149, 2012
402012
Threats to health information security
GN Samy, R Ahmad, Z Ismail
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
382009
Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems
KHA Mohammed Nasser Al-Mhiqani, Rabiah Ahmad Author, Warusia Yassin Author ...
International Journal of Advanced Computer Science and Applications (IJACSA …, 2018
37*2018
Integrating information quality dimensions into information security risk management (ISRM)
P Shamala, R Ahmad, A Zolait, M Sedek
Journal of Information Security and Applications 36, 1-10, 2017
352017
Knots of substitution techniques of audio steganography
M Zamani, AA Manaf, R Ahmad
The 2009 International Conference on Telecom Technology and Applications …, 2009
352009
A novel approach for audio watermarking
M Zamani, ABA Manaf, RB Ahmad, AM Zeki, P Magalingam
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
312009
Forensics readiness for wireless body area network (WBAN) system
AFA Rahman, R Ahmad, SN Ramli
16th International Conference on Advanced Communication Technology, 177-180, 2014
302014
A proposed framework for P2P Botnet detection
HR Zeidanloo, ABA Manaf, RB Ahmad, M Zamani, SS Chaeikar
International Journal of Engineering and Technology 2 (2), 161, 2010
302010
An artificial-intelligence-based approach for audio steganography
M Zamani, H Taherdoost, AA Manaf, RB Ahmad, AM Zeki
MASAUM Journal of Open Probelms in Science and Engineering (MJOPSE) 1 (1), 64-68, 2009
302009
The system can't perform the operation now. Try again later.
Articles 1–20