Penerbitan WOS

Imran Memon, Riaz Ahmed Shaikh, Mohammad Kamrul Hasan, Rosilah Hassan, Amin Ul Haq, Khairul Akram Zainol.  (2020).  Protect mobile travelers information in sensitive region based on fuzzy logic in IoT technology.  - Security and Communication Networks.  1-12. 

Rosilah Hassan, Khairol Amali Bin Ahmad, Khaleel Ahmad,.  (2019).  Introduction to the special issue on opportunistic network and its security challenges.  - Scalable computing: practice and experince.  3-5. 

Zainalabideen Ali, Azana Hafizah Mohd Aman, Rosilah Hassan.  (2019).  Cloud query processing analysis: encryption and decryption.  - 3C Tecnologia.  64-75. 

Azana Hafizah Mohd Aman, Rosilah Hassan, Aisha-Hassan A. Hashim, and Huda Adibah Mohd Ramli.  (2019).  Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol.  - Mehran University Research Journal of Engineering & Technology.  867-874. 

Azana Hafizah Mohd Aman, Syed Abdul Mutalib Al Junid, Hasimi Salehudin, Adil Hidayat, Rosilah Hassan, Syed Mohamed Aljunid.  (2019).  Ecosystem for healthcare services and management system.  - 3C Tecnologia.  120-131. 

Ghaith Mojib, Azana Hafizah Mohd Aman, Mahdi Khalaf, Rosilah Hassan.  (2019).  Simulation analysis for QoS in internet of things wireless network.  - 3C Tecnologia.  76-83. 

Sabri Saeed, Mahamod Ismail, Rosilah Hassan and Abdulmalek Al-Hemyari.  (2015).  Achievable throughput-based admission control for mobile ad hoc network: cross layer approach.  - Wireless Personal Communication.  2777-2796. 

Maha Abdelhaq, Rosilah Hassan dan Mahamod Ismail.  (2014).  Performance evaluation of mobile ad hoc networks under flooding-based attacks.  - International Journal of Communication Systems.  4328-4345. 

Al-Hemyari A., Ismail M., Hassan R., Saeed S..  (2014).  Lightweight multicast routing based on stable core for MANETs.  - KSII Transactions on Internet and Information Systems.  4411-4431. 

Samer Sami Hasan and Rosilah Hassan.  (2013).  Enhancement of Return Routability Mechanism for Optimized-NEMO Using Correspondent Firewall.  - Electronics and Telecommunications Research Institute (ETRI) Journal.  35(1):41-50.