Follow
Rabiah Ahmad, Ahmad R, R Ahmad
Rabiah Ahmad, Ahmad R, R Ahmad
Information Security and Networking Research Group UTeM ; University Tun Hussein Onn
Verified email at uthm.edu.my - Homepage
Title
Cited by
Cited by
Year
Objectively measured physical capability levels and mortality: systematic review and meta-analysis
R Cooper, D Kuh, R Hardy, Mortality Review Group
Bmj 341, 2010
12422010
Security threats categories in healthcare information systems
G Narayana Samy, R Ahmad, Z Ismail
Health informatics journal 16 (3), 201-209, 2010
1232010
Cyber-Security Incidents: A Review Cases in Cyber-Physical Systems
KHA Mohammed Nasser Al-Mhiqani, Rabiah Ahmad Author, Warusia Yassin Author ...
International Journal of Advanced Computer Science and Applications (IJACSA …, 2018
119*2018
A biometric-based security for data authentication in wireless body area network (wban)
SN Ramli, R Ahmad, MF Abdollah, E Dutkiewicz
2013 15th international conference on advanced communications technology …, 2013
1102013
Integrating information quality dimensions into information security risk management (ISRM)
P Shamala, R Ahmad, A Zolait, M Sedek
Journal of Information Security and Applications 36, 1-10, 2017
1032017
A conceptual framework of info structure for information security risk assessment (ISRA)
P Shamala, R Ahmad, M Yusoff
Journal of Information Security and Applications 18 (1), 45-52, 2013
1022013
A genetic-algorithm-based approach for audio steganography
M Zamani, AA Manaf, RB Ahmad, AM Zeki, S Abdullah
International Journal of Computer and Information Engineering 3 (6), 1562-1565, 2009
972009
Surveying the wireless body area network in the realm of wireless communication
SN Ramli, R Ahmad
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
922011
A secure audio steganography approach
M Zamani, ABA Manaf, RB Ahmad, F Jaryani, H Taherdoost, AM Zeki
2009 International Conference for Internet Technology and Secured …, 2009
912009
A review of insider threat detection: Classification, machine learning techniques, datasets, open challenges, and recommendations
MN Al-Mhiqani, R Ahmad, Z Zainal Abidin, W Yassin, A Hassan, ...
Applied Sciences 10 (15), 5208, 2020
772020
Generic taxonomy of social engineering attack and defence mechanism for handheld computer study
CFM Foozy, R Ahmad, MF Abdollah, R Yusof, MZ Mas’ud
Malaysian Technical Universities International Conference on Engineering …, 2011
612011
Robust audio steganography via genetic algorithm
M Zamani, H Taherdoost, AA Manaf, RB Ahmad, AM Zeki
2009 International Conference on Information and Communication Technologies …, 2009
612009
A dynamic cyber terrorism framework
R Ahmad, Z Yunos
International Journal of Computer Science and Information Security 10 (2), 149, 2012
592012
Identification of risk factors for 15-year mortality among community-dwelling older people using Cox regression and a genetic algorithm
R Ahmad, PA Bath
The Journals of Gerontology Series A: Biological Sciences and Medical …, 2005
572005
A new intelligent multilayer framework for insider threat detection
MN Al-Mhiqani, R Ahmad, ZZ Abidin, KH Abdulkareem, MA Mohammed, ...
Computers & Electrical Engineering 97, 107597, 2022
562022
Threats to health information security
GN Samy, R Ahmad, Z Ismail
2009 Fifth International Conference on Information Assurance and Security 2 …, 2009
542009
An approach to improve the robustness of substitution techniques of audio steganography
M Zamani, RB Ahmad, ABA Manaf, AM Zeki
2009 2nd IEEE International Conference on Computer Science and Information …, 2009
522009
A novel approach for genetic audio watermarking
M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, SS Chaeikar, ...
Journal of Information Assurance and Security 5 (1), 102-111, 2010
432010
Knots of substitution techniques of audio steganography
M Zamani, AA Manaf, R Ahmad
The 2009 International Conference on Telecom Technology and Applications …, 2009
432009
A proposed framework for P2P Botnet detection
HR Zeidanloo, ABA Manaf, RB Ahmad, M Zamani, SS Chaeikar
International Journal of Engineering and Technology 2 (2), 161, 2010
382010
The system can't perform the operation now. Try again later.
Articles 1–20