|
1 | A Survey on Components of Virtual Umrah Application | 2013 | International Journal of Multimedia & Its Applications (IJMA) | ERA | Co-Author |
2 | Enhanced Packet Scheduling Algorithm for Multihop Wireless LANs | 2012 | International Journal of Advanced Science and Technology | Other Index | Co-Author |
3 | Randomized Mouse Movement for Behavioural Biometric Identification | 2013 | International Journal of Interactive Digital Media (IJIDM) | Other Index | Main Author |
4 | A new model for hiding text in an image using logical connective | 2015 | International Journal of Multimedia and Ubiquitous Engineering | Scopus | Co-Author |
5 | Usability evaluation of virtual umrah based on user centered design from expert user view | 2015 | Jurnal Teknologi | Scopus | Co-Author |
6 | An image steganography algorithm based on logical connective | 2016 | Journal of Theoretical and Applied Information Technology | Scopus | Co-Author |
7 | Heuristic evaluation of virtual Umrah to improve user experience | 2016 | Advanced Science Letters | Scopus | Main Author |
8 | Evaluation of user interface satisfaction for virtual umrah among secondary school students | 2017 | Advanced Science Letters | Scopus | Co-Author |
9 | Evaluating User Interface Satisfaction of Virtual Umrah Application | 2017 | World Applied Sciences Journal | ERA | Co-Author |
10 | Mouse movement behavioral biometric for static user authentication | 2017 | Advanced Science Letters | Scopus | Co-Author |
11 | Recent Trends in Role Mining Algorithms for Role-Based Access Control: A Systematic Review | 2017 | World Applied Sciences Journal | ERA | Main Author |
12 | Program statement parser for computational programming feedback | 2017 | Journal of Engineering and Applied Sciences | Scopus | Co-Author |
13 | Assessing role mining algorithms using rminer tool in identifying the best model for access control | 2018 | Journal of Theoretical and Applied Information Technology | Scopus | Main Author |
14 | A conceptual model of role based access control using role mining algorithm | 2018 | Indonesian Journal of Electrical Engineering and Computer Science | Scopus | Main Author |
15 | An enhanced adaptive duty cycle scheme for energy efficiency and QoS awareness in wireless sensor networks | 2022 | International Journal of Advanced and Applied Sciences | ESCI , Scopus | Co-Author |
16 | A Novel Hybrid DL Model for Printed Arabic Word Recognition based on GAN | 2023 | International Journal of Advanced Computer Science and Applications | ESCI , Scopus | Co-Author |
17 | A Secure Online Voting System Using Face Recognition Technology | 2023 | Malaysian Journal Of Computing And Applied Mathematics | Other Index | Main Author |
18 | Spam Detection Model Using Tensorflow And Deep Learning Algorithm | 2023 | Malaysian Journal Of Computing And Applied Mathematics | Other Index | Co-Author |
19 | Password Manager Security Using Honey Encryption Algorithm And Honeypot Technique | 2023 | Malaysian Journal Of Computing And Applied Mathematics | Other Index | Co-Author |
20 | Hamming Distance Approach to Reduce Role Mining Scalability | 2023 | International Journal of Advanced Computer Science and Applications | ESCI , Scopus | Main Author |
21 | Spam detection by using machine learning based binary classifier | 2022 | Indonesian Journal of Electrical Engineering and Computer Science | Scopus | Co-Author |