Performance analysis of routing protocol for WSN using data centric approach AH Azni, MM Saudi, A Azman, AS Johari International Journal of Electrical, Computer, Energetic, Electronic and …, 2009 | 30 | 2009 |
Correlated node behavior model based on semi Markov process for MANETS AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin arXiv preprint arXiv:1203.4319, 2012 | 29 | 2012 |
Bluetooth mobile advertising system using pull-based approach AH Halim, AH Fauzi, S Tarmizi 2008 International Symposium on Information Technology 4, 1-4, 2008 | 22 | 2008 |
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art AA AlSabhany, AH Ali, F Ridzuan, AH Azni, MR Mokhtar Computer Science Review 38, 100316, 2020 | 20 | 2020 |
The adaptive multi-level phase coding method in audio steganography AA Alsabhany, F Ridzuan, AH Azni IEEE Access 7, 129291-129306, 2019 | 17 | 2019 |
Systematic review for network survivability analysis in MANETS AH Azni, R Ahmad, ZAM Noh, F Hazwani, N Hayaati Procedia-Social and Behavioral Sciences 195, 1872-1881, 2015 | 12 | 2015 |
Analysis of packets abnormalities in wireless sensor network AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar 2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009 | 12 | 2009 |
Denial of service:(DoS) Impact on sensors M Daud, R Rasiah, M George, D Asirvatham, AFA Rahman, A Ab Halim 2018 4th International Conference on Information Management (ICIM), 270-274, 2018 | 11 | 2018 |
MAC protocol to reduce packet collision in wireless sensor network AHA Halim, K Zen 2008 International Conference on Computer and Communication Engineering …, 2008 | 10 | 2008 |
Extracting software features from online reviews to demonstrate requirements reuse in software engineering NH Bakar, ZM Kasirun, N Salleh, AH Halim | 9 | 2017 |
Epidemic Modeling for Correlated Node Behavior in Ad Hoc Networks AH Azni, R Ahmad, ZAM Noh International Journal of Chaotic Computing (IJCC), 2013 | 9 | 2013 |
Survivability modeling and analysis of mobile ad hoc network with correlated node behavior AH Azni, R Ahmad, ZAM Noh Procedia Engineering 53, 435-440, 2013 | 9 | 2013 |
Factors influencing knowledge sharing in higher learning AH Azni, AA Baker, N Shah, H Abd Hamid 2010 International Symposium on Information Technology 3, 1606-1609, 2010 | 7 | 2010 |
Review and evaluation of data availability and network consistency in wireless sensor networks M Tabassum, S Perumal, AH Ab Halim Malaysian Journal of Science Health & Technology 4, 2019 | 6 | 2019 |
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud IEEE Access 8, 198646-198658, 2020 | 5 | 2020 |
The progressive multilevel embedding method for audio steganography AA Alsabhany, F Ridzuan, AH Azni Journal of physics: conference series 1551 (1), 012011, 2020 | 5 | 2020 |
Measuring sensor to cloud energy consumption AFA Rahman, AA Halim, NHM Alwi, KS Alwi, FA Mohamad, MN Taufiq, ... Proceedings of the 2018 2nd High Performance Computing and Cluster …, 2018 | 5* | 2018 |
An overview of STAKCERT framework in confronting worms attack MM Saudi, AJ Cullen, ME Woodward, HA Hamid, AH Abhalim 2009 2nd IEEE International Conference on Computer Science and Information …, 2009 | 5 | 2009 |
Visual perception games for autistic learners: Research findings F Shahbodin, CKNCK Mohd, AH Azni, Z Jano Proceedings of the 2019 Asia Pacific Information Technology Conference, 56-60, 2019 | 4 | 2019 |
A hybrid method for data communication using encrypted audio steganography AA Alsabhany, F Ridzuan, AH Azni Advanced Science Letters 23 (5), 4896-4900, 2017 | 4 | 2017 |