Penerbitan SCOPUS/ERA

bahera h. nayef siti norul huda sheikh abdullah, rossilawati sulaiman, zaid abdi al kareem alyasseri.  (2022).  variants of neural networks: a review.  - malaysian journal of computer science.  158-178. 

wenni syafitri, zarina shukur, umi a. mokhtar and rossilawati sulaiman and muhammad azwan ibrahim.  (2022).  social engineering attacks prevention: a systematic literature review.  - ieee access.  39325-39343. 

j. stanly jayaprakash, kishore balasubramanian, rossilawati sulaiman, mohammad kamrul hasan, b. d. parameshachari, celestine iwendi.  (2022).  cloud data encryption and authentication based on enhanced merkle hash tree method.  - computers, materials & continua.  519-534. 

mohammed abdul majeed, rossilawati sulaiman, zarina shukur.  (2022).  new text steganography technique based on multilayer encoding with format-preserving encryption and huffman coding.  - international journal of advanced computer science and applications (ijacsa).  163-172. 

bahera h. nayef, siti norul huda sheikh abdullah, rossilawati sulaiman, zaid abdi alkareem alyasseri.  (2022).  optimized leaky relu for handwritten arabic character recognition using convolution neural networks.  - multimedia tools and applications.  2065-2094. 

mohammed abdul majeed, rossilawati sulaiman, zarina shukur and mohammad kamrul hasan.  (2021).  a review on text steganography techniques.  - mathematics.  1-28. 

omar haitham alhabeeb, fariza fauzi, rossilawati sulaiman.  (2021).  a review of modern dna-based steganography approaches.  - international journal of advanced computer science and applications.  184-196. 

mohammad kamrul hasan, shayla islam, rossilawati sulaiman, sheroz khan, aisha hassan abdalla hashim, shabana habib, mohammad islam, saleh alyahya, musse mohamed ahmed, samar kamil, md arif hassan,.  (2021).  lightweight encryption technique to enhance medical image security on internet of medical things applications.  - ieee access.  47731-47742. 

ahmed hadi ali al-jumaili, yousif i. al mashhadany, rossilawati sulaiman, zaid abdi alkareem alyasseri.  (2021).  a conceptual and systematics for intelligent power management system-based cloud computing: prospects, and challenges.  - applied science.  1-41. 

muhammad amirulluqman azman, mohd fadzli marhusin, rossilawati sulaiman.  (2021).  machine learning-based technique to detect sql injection attack.  - journal of computer science.  296-303. 

ali abdulzahra almayyahi, rossilawati sulaiman, faizan qamar, abdulwahhab essa hamzah.  (2020).  high-security image steganography technique using xnor operation and fibonacci algorithm.  - international journal of advanced computer science and applications (ijacsa).  511-522. 

abdul hadi abd rahman, rossilawati sulaiman, nor samsiah sani, afzan adam, roham amini.  (2019).  evaluation of peer robot communications using cryptoros.  - international journal of advanced computer science and applications.  658-663. 

abbas alasri, rossilawati sulaiman.  (2018).  protection of xml-based denail-of-service and httpflooding attacks in web services using the middleware tool.  - international journal of engineering and technology. 

roham amini, rossilawati sulaiman, abdul hadi abd rahman kurais.  (2018).  cryptoros: a secure communication architecture for ros-based applications.  - international journal of advanced computer science and applications. 

salwa shakir baawi, mohd rosmadi mokhtar, rossilawati sulaiman.  (2018).  a comparative study on the advancement of text steganography techniques in digital media.  - arpn journal of engineering and applied sciences. 

nadeem alherbawi, zarina shukur, rossilawati sulaiman.  (2018).  jpeg image classification in digital forensic via dct coefficient analysis.  - journal of multimedia tools and applications. 

mohammed a.f. salah, mohd fadzli marhusin, rossilawati sulaiman.  (2017).  malware research directions: a look into ransomware.  - asian journal of information technology.  458-464. 

salwa shakir baawi, mohd rosmadi mokhtar, rossilawati sulaiman.  (2017).  new text steganography technique based on a set of two-letter words.  - journal of theoretical and applied information technology.  6246-6255. 

nadeem alherbawi, zarina shukur, rossilawati sulaiman.  (2017).  current techniques in jpeg image authentication and forgery detection.  - journal of engineering and applied sciences.  104-112. 

hussein albadri, rossilawati sulaiman.  (2016).  a classification method for identifying confidential data to enhance efficiency of query processing over cloud.  - journal of theoretical and applied information technology.  412-420. 

nadeem alherbawi, zarina shukur, rossilawati sulaiman.  (2016).  a survey on data carving in digital forensic.  - asian journal of information technology.  5137-5144. 

marwan alshar`e, abdullah mohd zin, rossilawati sulaiman, mohd rosmadi mokhtar.  (2015).  evaluation of the tpm user authentication model for trusted computers.  - journal of theoretical and applied information technology.  298-309. 

marhusin m.f., kafli m.f.z., sulaiman r., ismail s., abdullah z.h..  (2015).  a framework for a multi-layered security of an automated programming code assessment tool.  - journal of computer science.  406-415. 

mohammed abdul majeed, rossilawati sulaiman.  (2015).  an improved lsb image steganography technique using bit-inverse in 24 bit colour image.  - journal of theoretical and applied information technology.  342-348. 

nazatul aini abd majid, hazura mohammed, rossilawati sulaiman.  (2015).  the use of augmented reality application in a large-enrolment class for increasing students` attention.  - australian journal of basic and applied sciences.  1-6. 

mohd fadzli marhusin, muhammad firdaus zul kafli, rossilawati sulaiman, shaharudin ismail, zul hilmi abdullah.  (2014).  a framework for a multi-layered security of an automated programming code assessment tool.  - journal of computer science.  417-426. 

nor amuni md rashid, norleyza jailani, rossilawati sulaiman, zuraidah abdullah.  (2014).  multi agent security architecture for a sharia compliant e-auction..  - journal of theoretical and applied information technology.  345-355. 

marwan ibrahim alshar`e, rossilawati sulaiman, mohd rosmadi mokhtar, abdullah mohd zin.  (2014).  a user protection model for the trusted computing environment.  - journal of computer science.  1692-1702. 

marwan ibrahim alshar`e, rossilawati sulaiman, mohd rosmadi mokhtar and abdullah mohdzin.  (2014).  design and implementation of the tpm user authentication model.  - journal of computer science.  2299-2314. 

mohd fadhli abdul jalil, rossilawati sulaiman.  (2014).  secure architecture for m-health communications using multi-agent approach.  - research journal of applied sciences, engineering and technology.  2583-2588. 

rossilawati sulaiman, dharmendra sharma, wanli ma, dat tran.  (2012).  securing online communications using mlc and mas in e- health.  - australian journal of basic and applied sciences.  6(9):588-604. 

rossilawati sulaiman, dharmendra sharma, wanli ma and dat tran.  (2012).  enhancing security in e-health communications using multi-agent system.  - journal of computer science.  8(5):637-647. 

rabab a. abbas, mohd rosmadi mokhtar, rossilawati sulaiman, zulaiha ali othman and abdullah mohd zin.  (2012).  impact of disasters in southeast asia on malaysian computer networks.  - journal of theoretical and applied information technology.  37(2):188-198. 

rossilawati sulaiman, dharmendra sharma, wanli ma, dat tran.  (2011).  a new security model using multilayer approach for e-health services.  - journal of computer science.  7(11):1691-1703.