IIUM Repository (IREP)

Items where Author is "Abduallah, Wafaa Mustafa"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Item Type | No Grouping
Number of items: 7.

Article

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2014) Mix column transform based on irreducible polynomial mathematics for color image steganography: a novel approach. Computers & Electrical Engineering, 40 (4). pp. 1390-1404. ISSN 0045-7906

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) A new data hiding technique based on irreducible polynomials. Journal of Emerging Technologies in Web Intelligence. ISSN 1798-0461 (In Press)

Pathan, Al-Sakib Khan and Abduallah, Wafaa Mustafa and Khanam, Shapla and Saleem, Habibullah Yusuf (2012) A pay-and-stay model for tackling intruders in hybrid wireless mesh networks. Simulation-Transactions of the Society for Modeling and Simulation International, 89 (5). pp. 616-634. ISSN 0037-5497

Alsafi, Hassen Mohammed and Abduallah, Wafaa Mustafa and Pathan, Al-Sakib Khan (2012) IDPS: an integrated intrusion handling model for cloud computing environment. International Journal of Computing & Information Technology (IJCIT), 4 (1). pp. 1-16. ISSN 0974-696X

Book Chapter

Pathan, Al-Sakib Khan and Khanam, Shapla and Saleem, Habibullah Yusuf and Abduallah, Wafaa Mustafa (2013) Tackling Intruders in Wireless Mesh Networks. In: Distributed Network Intelligence, Security and Applications. CRC Press, USA, USA, pp. 167-190. ISBN 9781466559578

Conference or Workshop Item

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) Data hiding within color images based on MCT with x-or operations. In: 2nd International Conference on Advanced Computer Science Applications and Technologies (ACSAT2013), 22-24 December 2013, Kuching, Sarawak, Malaysia.

Abduallah, Wafaa Mustafa and Rahma, Abdul Monem S. and Pathan, Al-Sakib Khan (2013) Reversible data hiding scheme based on 3-Least significant bits and mix column transform. In: 4th International Workshop on Applications and Techniques in Information Security (ATIS), 26 September 2013, Sydney, Australia. (Unpublished)

This list was generated on Tue Nov 21 05:22:17 2017 +08.