pensyarah universiti
pusat kajian keselamatan siber (cyber)
rossilawati@ukm.edu.my
PENSYARAH UNIVERSITI
murad njoum; rossilawati sulaiman; zarina shukur; faizan qamar. (2026). secure data hiding and transmission utilizing multi-layered cryptographic and steganographic techniques with high capacity. - international conference on electrical engineering and informatics, iceei . 919 - 924.
mohammed a. f. salah, mohd fadzli marhusin, rossilawati sulaiman. (2025). a bio-inspired behavior-based hybrid framework for ransomware detection. - international journal of advanced computer science and applications (ijacsa) . 462 - 472.
m. s. mozamir, r. sulaiman, b. mohd aboobaider. (2025). a secure and privacy-aware in goat milk quality classification using topsis. - 2025 3rd international conference on cyber resilience (iccr). 1 - 6.
isyraf danisy mat zamri, rossilawati sulaiman. (2025). sistem pengesanan rondaan berkala dan laporan insiden keselamatan wisma aman ukm (selamat wisma). - . .
nur qamarina rahim, rossilawati sulaiman. (2025). sistem tempahan kemudahan sukan (ukm sportshub). - . .
omar haitham alhabeeb, fariza fauzi, rossilawati sulaiman. (2024). developing a novel dna-based steganography algorithm using random table generation with segmentation. - multimedia tools and applications. 40529-40567.
bahera h. nayef, siti norul huda sheikh abdullah, rossilawati sulaiman and ashwaq mukred saeed. (2023). text extraction with optimal bi-lstm. - computers materials & continua. 3549-3567.
mousab mohammad shtayat, mohammad kamrul hasan, rossilawati sulaiman, shayla islam, atta ur rehman. (2023). an explainable ensemble deep learning approach for intrusion detection in industrial internet of things. - ieee access. 15047-15061.
bahera h. nayef, siti norul huda sheikh abdullah, rossilawati sulaiman, zaid abdi alkareem alyasseri. (2022). optimized leaky relu for handwritten arabic character recognition using convolution neural networks. - multimedia tools and applications. 2065-2094.
wenni syafitri, zarina shukur, umi a. mokhtar and rossilawati sulaiman and muhammad azwan ibrahim. (2022). social engineering attacks prevention: a systematic literature review. - ieee access. 39325-39343.
njoum, murad; sulaiman, rossilawati; shukur, zarina; qamar, faizan. (2024). high-secured image lsb steganography using avl-tree with random rgb channel substitution. - computers, materials and continua. 183 - 211.
afm zainul abadin, rossilawati sulaiman, mohammad kamrul hasan. (2024). randomization strategies in image steganography techniques: a review. - computers, materials & continua. 3139 - 3171.
mohammed abdul majeed, rossilawati sulaiman, zarina shukur. (2024). new text steganography technique based on part-of-speech tagging and format-preserving encryption. - ksii transactions on internet and information systems. 170-191.
bahera h. nayef siti norul huda sheikh abdullah, rossilawati sulaiman, zaid abdi al kareem alyasseri. (2022). variants of neural networks: a review. - malaysian journal of computer science. 158-178.
abdul hadi abd rahman, rossilawati sulaiman, nor samsiah sani, afzan adam, roham amini. (2019). evaluation of peer robot communications using cryptoros. - international journal of advanced computer science and applications. 658-663.
mohammad kamrul hasan, anil kumar budhati, rossliawati solaiman, shayla islam, b pandey, huda saleh abbas, mamoon m saeed. (2025). an improved binary spider wasp optimization algorithm for intrusion detection for industrial internet of things. - ieee open journal of the communications society. 2926 - 2944.
wenni syafitri, zarina shukur, umi asma’ mokhtar, rossilawati sulaiman. (2025). methodological review of social engineering policy model for digital marketing. - (ijacsa) international journal of advanced computer science and applications. 874 - 885.
mohammed a. f. salah, mohd fadzli marhusin, rossilawati sulaiman. (2025). a bio-inspired behavior-based hybrid framework for ransomware detection. - international journal of advanced computer science and applications (ijacsa) . 462 - 472.
afm zainul abadin, rossilawati sulaiman, mohammad kamrul hasan. (2024). randomization strategies in image steganography techniques: a review. - computers, materials & continua. 3139 - 3171.
njoum, murad; sulaiman, rossilawati; shukur, zarina; qamar, faizan. (2024). high-secured image lsb steganography using avl-tree with random rgb channel substitution. - computers, materials and continua. 183 - 211.
murad njoum; rossilawati sulaiman; zarina shukur; faizan qamar. (2026). secure data hiding and transmission utilizing multi-layered cryptographic and steganographic techniques with high capacity. - international conference on electrical engineering and informatics, iceei . 919 - 924.
m. s. mozamir, r. sulaiman, b. mohd aboobaider. (2025). a secure and privacy-aware in goat milk quality classification using topsis. - 2025 3rd international conference on cyber resilience (iccr). 1 - 6.
sami ghoul, rossilawati sulaiman. (2023). imperceptible image steganography technique using a novel pit-based technique. - 2022 international conference on cyber resilience (iccr). 1-7.
marziana abdul majid, zulkefli mansor dan rossilawati sulaiman. (2023). managing security hazards in byod: a comparative analysis of artificial intelligent techniques. - ieee explorer. 1-5.
salwa shakir baawi, mohd rosmadi mokhtar, rossilawati sulaiman. (2019). enhancement of text steganography technique using lempel-ziv-welch algorithm and two-letter word technique. - 3rd international conference of reliable information and communication technology. 525-537.
abdul hadi abd rahman, salwani abdullah, rossilawati sulaiman, roham amini. (2021). model robotik awan. - . 105-117.
norhafizah abu bakar, masnizah mohd, rossilawati sulaiman, mohd syazwan baharuddin. (2019). prosedur simulasi pancingan data spesifik di universiti kebangsaan malaysia. - . 72-89.
noorazean mohd ali, nazatul aini abd majid, rossilawati sulaiman. (2019). membina cerita digital berasaskan konsep pemikiran komputasional. - . 126-139.
zarina shukur, khairul azmi abu bakar, ravie chandren muniyandi, rossilawati sulaiman & zulkarnain md. ali. (2017). keselamatan komputer dan penentusahan perisian. - . 97-104.
nor hanim che hassan & rossilawati sulaiman. (2015). penilaian prestasi perkhidmatan web yang selamat dengan menggunakan kaedah pelbagai lapisan komunikasi dalam e-kesihatan. - . 200-209.
isyraf danisy mat zamri, rossilawati sulaiman. (2025). sistem pengesanan rondaan berkala dan laporan insiden keselamatan wisma aman ukm (selamat wisma). - . .
nur qamarina rahim, rossilawati sulaiman. (2025). sistem tempahan kemudahan sukan (ukm sportshub). - . .
farah izzati norwahidi, rossilawati sulaiman. (2025). rentfit: sistem penyewaan pakaian berasaskan web untuk gaya moden. - . .
nur alleeya maisara rosli, rossilawati sulaiman. (2025). sistem penyewaan dan pengurusan baju (sewaglamukm). - . .
zarina binti shukur;maryati binti mohd. yusof;rossilawati binti sulaiman;andrew kam jia yi. (2023). connectivity through software standardization: metrology software certification criteria. - . .
isyraf danisy mat zamri, rossilawati sulaiman. (2025). sistem pengesanan rondaan berkala dan laporan insiden keselamatan wisma aman ukm (selamat wisma). - . .
nur qamarina rahim, rossilawati sulaiman. (2025). sistem tempahan kemudahan sukan (ukm sportshub). - . .
farah izzati norwahidi, rossilawati sulaiman. (2025). rentfit: sistem penyewaan pakaian berasaskan web untuk gaya moden. - . .
nur alleeya maisara rosli, rossilawati sulaiman. (2025). sistem penyewaan dan pengurusan baju (sewaglamukm). - . .
abdul hakim abd rahim, rossilawati sulaiman. (2023). sistem aplikasi web pote' coffee. - laporan teknik. 1-13.
| Geran / Grant | Kolaborator / Collaborator | Status |
|---|---|---|
| FUZZY HASHING BASED ON INDICATOR OF COMPROMISES (IOCS) FROM VOLATILE MEMORY FOR MALWARE DETECTION PROBLEMS | cybersecurity malaysia | 79.8% (2023-10-01 sehingga 2026-09-30) |
| DESIGNING A SECURE VARIANT OF THE M-SIDH/MD-SIDH POST-QUANTUM CRYPTOGRAPHIC KEY-EXCHANGE PROTOCOL | cybersecurity malaysia | 11.2% (2025-12-01 sehingga 2027-11-30) |
| PROGRAM KESEDARAN JENAYAH SIBER UNTUK MASYARAKAT YANG MEMERLUKAN | yayasan ez prihatin | 63.6% (2024-11-14 sehingga 2026-11-14) |
CYBER SECURITY :INFORMATION AND COMMUNICATION TECHNOLOGY
Steganography, Applied cryptography, Information Security
Pengalaman / Experience : tahun/years(s)