Ainuddin Wahid Abdul Wahab
Ainuddin Wahid Abdul Wahab
Department of Computer System and Technology, University of Malaya
Verified email at - Homepage
Cited by
Cited by
A review on feature selection in mobile malware detection
A Feizollah, NB Anuar, R Salleh, AWA Wahab
Digital investigation 13, 22-37, 2015
Image steganography in spatial domain: A survey
M Hussain, AWA Wahab, YIB Idris, ATS Ho, KH Jung
Signal Processing: Image Communication 65, 46-66, 2018
Copy-move forgery detection: survey, challenges and future directions
NB Abd Warif, AWA Wahab, MYI Idris, R Ramli, R Salleh, ...
Journal of Network and Computer Applications 75, 259-278, 2016
Energy harvesting and battery power based routing in wireless sensor networks
MH Anisi, G Abdul-Salaam, MYI Idris, AWA Wahab, I Ahmedy
Wireless Networks 23 (1), 249-266, 2017
Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art
S Khan, A Gani, AWA Wahab, M Guizani, MK Khan
IEEE Communications Surveys & Tutorials 19 (1), 303-324, 2016
Network forensics: Review, taxonomy, and open challenges
S Khan, A Gani, AWA Wahab, M Shiraz, I Ahmad
Journal of Network and Computer Applications 66, 214-235, 2016
Robust watermarking algorithm for digital images using discrete wavelet and probabilistic neural network
ALN Yahya, HA Jalab, A Wahid, RM Noor
Journal of King saud university-Computer and Information sciences 27 (4 …, 2015
Cloud log forensics: foundations, state of the art, and future directions
S Khan, A Gani, AWA Wahab, MA Bagiwa, M Shiraz, SU Khan, R Buyya, ...
ACM Computing Surveys (CSUR) 49 (1), 1-42, 2016
A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement
M Hussain, AWA Wahab, ATS Ho, N Javed, KH Jung
Signal Processing: Image Communication 50, 44-57, 2017
SIFT-symmetry: a robust detection method for copy-move forgery with reflection attack
NBA Warif, AWA Wahab, MYI Idris, R Salleh, F Othman
Journal of Visual Communication and Image Representation 46, 219-232, 2017
Passive video forgery detection techniques: a survey
AWA Wahab, MA Bagiwa, MYI Idris, S Khan, Z Razak, MRK Ariffin
2014 10th International Conference on Information Assurance and Security, 29-34, 2014
A comprehensive review on adaptability of network forensics frameworks for mobile cloud computing
S Khan, M Shiraz, AW Abdul Wahab, A Gani, Q Han, Z Bin Abdul Rahman
The Scientific World Journal 2014, 2014
Feature selection of denial-of-service attacks using entropy and granular computing
S Khan, A Gani, AWA Wahab, PK Singh
Arabian Journal for Science and Engineering 43 (2), 499-508, 2018
A novel forged blurred region detection system for image forensic applications
DM Uliyan, HA Jalab, AWA Wahab, P Shivakumara, S Sadeghi
Expert Systems with Applications 64, 1-10, 2016
Synchronization in coupled Ikeda delay systems
D Valli, B Muthuswamy, S Banerjee, MRK Ariffin, AWA Wahab, ...
The European Physical Journal Special Topics 223 (8), 1465-1479, 2014
Recursive information hiding scheme through LSB, PVD shift, and MPE
M Hussain, AWA Wahab, N Javed, KH Jung
IETE Technical Review 35 (1), 53-63, 2018
Hybrid data hiding scheme using right-most digit replacement and adaptive least significant bit for digital images
M Hussain, AW Abdul Wahab, N Javed, KH Jung
Symmetry 8 (6), 41, 2016
Precipitation estimation using support vector machine with discrete wavelet transform
M Shenify, AS Danesh, M Gocić, RS Taher, AWA Wahab, A Gani, ...
Water Resources Management 30 (2), 641-652, 2016
A lightweight perceptron-based intrusion detection system for fog computing
B Sudqi Khater, AWB Abdul Wahab, MYIB Idris, M Abdulla Hussain, ...
Applied Sciences 9 (1), 178, 2019
Virtual community detection through the association between prime nodes in online social networks and its application to ranking algorithms
MS Khan, AWA Wahab, T Herawan, G Mujtaba, S Danjuma, MA Al-Garadi
IEEE Access 4, 9614-9624, 2016
The system can't perform the operation now. Try again later.
Articles 1–20