Follow
A H Azni
Title
Cited by
Cited by
Year
Digital audio steganography: Systematic review, classification, and analysis of the current state of the art
AA AlSabhany, AH Ali, F Ridzuan, AH Azni, MR Mokhtar
Computer Science Review 38, 100316, 2020
792020
The adaptive multi-level phase coding method in audio steganography
AA Alsabhany, F Ridzuan, AH Azni
IEEE Access 7, 129291-129306, 2019
362019
Performance analysis of routing protocol for WSN using data centric approach
AH Azni, MM Saudi, A Azman, AS Johari
World Academy of Science, Engineering and Technology 53, 2009
332009
Correlated node behavior model based on semi Markov process for MANETS
AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin
arXiv preprint arXiv:1203.4319, 2012
292012
Bluetooth mobile advertising system using pull-based approach
AH Halim, AH Fauzi, S Tarmizi
2008 International Symposium on Information Technology 4, 1-4, 2008
242008
Systematic review for network survivability analysis in MANETS
AH Azni, R Ahmad, ZAM Noh, F Hazwani, N Hayaati
Procedia-Social and Behavioral Sciences 195, 1872-1881, 2015
232015
Extended RECTANGLE algorithm using 3D bit rotation to propose a new lightweight block cipher for IoT
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
IEEE Access 8, 198646-198658, 2020
222020
Systematic literature review: Trend analysis on the design of lightweight block cipher
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
Journal of King Saud University-Computer and Information Sciences 35 (5), 101550, 2023
212023
Denial of service:(DoS) Impact on sensors
M Daud, R Rasiah, M George, D Asirvatham, AFA Rahman, A Ab Halim
2018 4th International Conference on Information Management (ICIM), 270-274, 2018
162018
The progressive multilevel embedding method for audio steganography
AA Alsabhany, F Ridzuan, AH Azni
Journal of physics: conference series 1551 (1), 012011, 2020
142020
Visual perception games for autistic learners: Design & development
CKNCK Mohd, F Shahbodin, Z Jano, AH Azni
Proceedings of the 2019 Asia Pacific information technology conference, 5-11, 2019
132019
Survivability modeling and analysis of mobile ad hoc network with correlated node behavior
AH Azni, R Ahmad, ZAM Noh
Procedia Engineering 53, 435-440, 2013
132013
Analysis of Packets Abnormalities in Wireless Sensor Network
AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar
2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009
122009
Extracting software features from online reviews to demonstrate requirements reuse in software engineering
NH Bakar, ZM Kasirun, N Salleh, AH Halim
112017
MAC protocol to reduce packet collision in wireless sensor network
AHA Halim, K Zen
2008 International Conference on Computer and Communication Engineering …, 2008
102008
LAO-3D: A symmetric lightweight block cipher based on 3d permutation for mobile encryption application
AA Zakaria, AH Ab Halim, F Ridzuan, NH Zakaria, M Daud
Symmetry 14 (10), 2042, 2022
92022
Epidermic modelling for correlated node behavior in ad hoc networks
AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin
International Journal of Chaotic Computing 1 (1), 22-30, 2013
92013
A theoretical comparative analysis of DNA techniques used in DNA based cryptography
NAN Abdullah, NH Zakaria, AH Ab Halim, FHM Ridzuan, A Ahmad, ...
Journal of Sustainability Science and Management 17 (5), 165-178, 2022
82022
Modifications of key schedule algorithm on RECTANGLE block cipher
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
Advances in Cyber Security: Second International Conference, ACeS 2020 …, 2021
82021
Measuring sensor to cloud energy consumption
AH Azni, AFA Rahman, NHM Alwi, K Seman
Proceedings of the Second International Conference on Internet of things …, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20