A survey on the cryptographic encryption algorithms MF Mushtaq, S Jamel, AH Disina, ZA Pindar, NSA Shakir, MM Deris International Journal of Advanced Computer Science and Applications 8 (11), 2017 | 161 | 2017 |
Comparative analysis between dijkstra and bellman-ford algorithms in shortest path optimization SWG AbuSalim, R Ibrahim, MZ Saringat, S Jamel, JA Wahab IOP Conference Series: Materials Science and Engineering 917 (1), 012077, 2020 | 59 | 2020 |
A review of digital forensics methods for JPEG file carving RR Ali, KM Mohamad, S Jamel, SKA Khalid J. Theor. Appl. Inf. Technol 96 (17), 5841-5856, 2018 | 28 | 2018 |
The hybrid cubes encryption algorithm (HiSea) S Jamel, MM Deris, ITR Yanto, T Herawan International Conference on Computer Science, Engineering and Applications …, 2011 | 19 | 2011 |
Reducing redundancy of test cases generation using code smell detection and refactoring R Ibrahim, M Ahmed, R Nayak, S Jamel Journal of King Saud University-Computer and Information Sciences 32 (3 …, 2020 | 18 | 2020 |
A cryptographic algorithm based on hybrid cubes S Jamel, T Herawan, MM Deris Computational Science and Its Applications–ICCSA 2010: International …, 2010 | 17 | 2010 |
A policy driven, human oriented information security model: A case study in UAE banking sector KEHA Alhosani, SKA Khalid, NA Samsudin, S Jamel, KM bin Mohamad 2019 IEEE Conference on Application, Information and Network Security (AINS …, 2019 | 16 | 2019 |
Comparing the legendre wavelet filter and the Gabor wavelet filter for feature extraction based on Iris recognition system M Danlami, S Jamel, SN Ramli, SRM Azahari 2020 IEEE 6th International Conference on Optimization and Applications …, 2020 | 15 | 2020 |
Key generation technique based on triangular coordinate extraction for hybrid cubes MF Mushtaq, S Jamel, KM Mohamad, SKA Khalid, MM Deris Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 13 | 2017 |
Triangular coordinate extraction (TCE) for hybrid cubes MF Mushtaq, S Jamel, MM Deris Journal of Engineering and Applied Sciences 12 (8), 2164-2169, 2017 | 13 | 2017 |
Designing a model for smart city through digital transformation NAM Asri, R Ibrahim, S Jamel International Journal of Advanced Trends in Computer Science and Engineering …, 2019 | 9 | 2019 |
Classification of JPEG files by using extreme learning machine RR Ali, KM Mohamad, S Jamel, SKA Khalid Recent Advances on Soft Computing and Data Mining: Proceedings of the Third …, 2018 | 9 | 2018 |
All-or-Nothing Key Derivation Function Based on Quasigroup String Transformation AH Disina, S Jamel, ZA Pindar, MM Deris 2016 International Conference on Information Science and Security (ICISS), 1-5, 2016 | 9 | 2016 |
Compression function based on permutations and quasi groups Pindar Z.A., Jamel S.,Disina A.H., Deris M.M. ARPN Journal of Engineering and Applied Sciences 11 (22), 13100 - 13107, 2016 | 9* | 2016 |
Enhanced caeser cipher to exclude repetition and withstand frequency cryptanalysis AH Disina, ZA Pindar, SBH Jamel J. Netw. Inf. Secur. Vol 2, 7-13, 2014 | 9 | 2014 |
HiSea: A non binary toy cipher S Jamel, MM Deris, I Tri, R Yanto, T Herawan Journal of Computing 3 (6), 2027, 2011 | 8 | 2011 |
Diffusive primitives in the design of modern cryptographic algorithms SH Jamel, MM Deris 2008 International Conference on Computer and Communication Engineering, 707-710, 2008 | 8 | 2008 |
EPiT: A software testing tool for generation of test cases automatically R Ibrahim, AAB Amin, S Jamel, JA Wahab arXiv preprint arXiv:2007.11197, 2020 | 7 | 2020 |
Key schedule algorithm using 3-dimensional hybrid cubes for block cipher MF Mushtaq, S Jamel, SRB Megat, U Akram, MM Deris International Journal of Advanced Computer Science and Applications 10 (8), 2019 | 7 | 2019 |
A review of iris recognition algorithms AA Ghali, S Jamel, KM Mohamad, NA Yakub, MM Deris JOIV: International Journal on Informatics Visualization 1 (4-2), 175-178, 2017 | 7 | 2017 |