A survey on steganography techniques in real time audio signals and evaluation AZ Al-Othmani, AA Manaf, AM Zeki International Journal of Computer Science Issues (IJCSI) 9 (1), 30, 2012 | 50 | 2012 |
Identifying the determinants of cloud computing adoption in higher education institutions SA Mokhtar, A Al-Sharafi, SHS Ali, AZ Al-Othmani 2016 International Conference on Information and Communication Technology …, 2016 | 39 | 2016 |
Applying an agent-based user authentication and access control model for cloud servers M Hajivali, F Fatemi Moghaddam, MT Alrashdan, AZM Alothmani International Conference on ICT Convergence (ICTC), 2013, 807 - 812, 2013 | 29 | 2013 |
Blockchain-based adoption framework for authentic land registry system in Malaysia A Aborujilah, MNBM Yatim, A Al-Othmani TELKOMNIKA (Telecommunication Computing Electronics and Control) 19 (6 …, 2021 | 12 | 2021 |
Empirical analysis for stock price prediction using NARX model with exogenous technical indicators AH Dhafer, FM Nor, G Alkawsi, AZ Al-Othmani, NR Shah, HM Alshanbari, ... Computational Intelligence and Neuroscience 2022, 2022 | 8 | 2022 |
Security assessment model to analysis DOS attacks in WSN A Aborujilah, RM Nassr, T Al-Hadhrami, MN Husen, NA Ali, ... Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020 | 8 | 2020 |
Conceptual model for automating gdpr compliance verification using natural language approach A Aborujilah, AZ Al-Othmani, ZA Long, NS Hussien, DA Ghani 2022 International Conference on Intelligent Technology, System and Service …, 2022 | 5 | 2022 |
Cybersecurity Risk Assessment Approach for Malaysian Organizations: Malaysian Universities as Case Study A Aborujilah, AZ Al-Othmani, NS Hussien, SA Mokhtar, ZA Long, M Nizam 2022 9th International Conference on Electrical and Electronics Engineering …, 2022 | 5 | 2022 |
Prototype development of VOIP steganography A AL-OTHMANI Universiti Teknologi Malaysia, 2009 | 5 | 2009 |
Adoption and continuance intention model of applying telemedicine technology in digital games addiction A Aborujilah, R Mohammad, AAZ Al-Othmani, MN Husen, ZA Long, NA Ali, ... 2020 14th International Conference on Ubiquitous Information Management and …, 2020 | 4 | 2020 |
Keystroke dynamics analysis to enhance password security of mobile banking applications MT Alrashdan International Journal of Advanced Computer Technology 9 (6), 8-16, 2020 | 2 | 2020 |
Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal AZ Al-Othmani, AA Manaf, AM Zeki, Q Almaatouk, A Aborujilah, ... 2020 14th International Conference on Ubiquitous Information Management and …, 2020 | 2 | 2020 |
Post acceptance model for online teleconsultation services: An empirical study in Malaysia A Aborujiah, R Mohammad Nassr, A Al-Othmani, Z Awang Long, ... International journal of electrical and computer engineering systems, 59-69, 2021 | 1 | 2021 |
Comparative Study of SMOTE and Bootstrapping Performance Based on Predication Methods A Aborujilah, RM Nassr, T Al-Hadhrami, MN Husen, NA Ali, AA Othmani, ... International conference of reliable information and communication …, 2020 | 1 | 2020 |
SECURED SOFTWARE EMBEDDED SYSTEM AGAINST DATA BREACHES ON AUTOMOTIVE INDUSTRY D Kurniawan, MT Alrashdan, Q Al-Maatouk, AZ Al-Othmani International Journal of Management (IJM) 11 (11), 2020 | 1 | 2020 |
CIA-based Analysis for E-Leaming Systems Threats and Countermeasures in Malaysian Higher Education A Aborujilah, J Adamu, SA Mokhtar, AZ Al-Othmani, EY Al-Alwi, ... 2023 17th International Conference on Ubiquitous Information Management and …, 2023 | | 2023 |
Exploring Critical Challenges and Factors Influencing E-Learning Systems Security During COVID-19 Pandemic A Aborujilah, EY Al-Alawi, DA Al-Hidabi, AZ Al-Othmani 2022 International Conference on Intelligent Technology, System and Service …, 2022 | | 2022 |
A Fingerprint Authentication for Android-Based Healthcare Appointment Scheduling System A Al-Shujaa, MS Nabi, Q Al-Maatouk, AZ Al-Othmani, NAA Rahman Int J Cur Res Rev| Vol 13 (12), 118, 2021 | | 2021 |
SMOTE-Based Framework for IoT Botnet Attack Detection A Aborujilah, RM Nassr, AA Al-Othmani, NA Ali, ZA Long, MN Husen, ... Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021 | | 2021 |
A mathematical Model for Selecting Features of Flooding Attacks Detection Methods based on Stability Criterion A Aborujilah, NA Ali, RM Nassr, MN Husen, AA Al-Othmani, KA Alezabi, ... 2019 13th International Conference on Mathematics, Actuarial Science …, 2019 | | 2019 |