Shoulder surfing attack in graphical password authentication AH Lashkari, S Farmand, D Zakaria, O Bin, D Saleh arXiv preprint arXiv:0912.0951, 2009 | 175 | 2009 |
The future of mobile wireless communication networks X Li, A Gani, R Salleh, O Zakaria 2009 International Conference on Communication Software and Networks, 554-557, 2009 | 158 | 2009 |
Apparatus and method for establishing secure communication channels in an internet of things (IoT) system O Zakaria, J Britt, S Zimmerman US Patent 9,699,814, 2017 | 114 | 2017 |
System and method for automatic wireless network authentication O Zakaria US Patent 9,838,390, 2017 | 103 | 2017 |
System and method for accurately sensing user location in an IoT system O Zakaria US Patent 10,045,150, 2018 | 95 | 2018 |
Identifying false alarm for network intrusion detection system using hybrid data mining and decision tree NB Anuar, H Sallehudin, A Gani, O Zakaria Malaysian journal of computer science 21 (2), 101-115, 2008 | 95 | 2008 |
Enhancing selective encryption for H. 264/AVC using advanced encryption standard M Abomhara, O Zakaria, OO Khalifa, AA Zaidan, BB Zaidan arXiv preprint arXiv:2201.03391, 2022 | 88 | 2022 |
An overview of video encryption techniques M Abomhara, O Zakaria, OO Khalifa International Journal of Computer Theory and Engineering 2 (1), 1793-8201, 2010 | 79 | 2010 |
Review of mobile short message service security issues and techniques towards the solution A Medani, A Gani, O Zakaria, AA Zaidan, BB Zaidan Scientific Research and Essays 6 (6), 1147-1165, 2011 | 66 | 2011 |
Internet of Things (IoT) automotive device, system, and method O Zakaria, J Britt, H Forood US Patent 9,717,012, 2017 | 49 | 2017 |
System and method for performing asset and crowd tracking in an IoT system H Forood, J Britt, O Zakaria, J Lee, G Gallardo US Patent 10,178,530, 2019 | 47 | 2019 |
Embedded internet of things (IOT) hub for integration with an appliance and associated systems and methods O Zakaria, J Britt, H Forood US Patent 9,974,015, 2018 | 47 | 2018 |
Novel approach for high (secure and rate) data hidden within triplex space for executable file AA Zaidan, BB Zaidan, OH Alanazi, A Gani, O Zakaria, GM Alam Scientific Research and Essays 5 (15), 1965-1977, 2010 | 47 | 2010 |
Internalisation of information security culture amongst employees through basic security knowledge O Zakaria Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 …, 2006 | 46 | 2006 |
Apparatus and method for a dynamic scan interval for a wireless device O Zakaria US Patent 9,503,969, 2016 | 45 | 2016 |
Modular antenna for integration with an internet of things (IOT) hub and associated systems and methods O Zakaria, J Britt, H Forood US Patent 9,847,569, 2017 | 44 | 2017 |
A conceptual checklist of information security culture O Zakaria, A Gani 2nd European Conference on Information Warfare and Security, Reading, UK, 2003 | 44 | 2003 |
Suitability of using symmetric key to secure multimedia data: An overview M Abomhara, OO Khalifa, O Zakaria, AA Zaidan, BB Zaidan, H O Alanazi Journal of Applied Sciences 10 (15), 1656-1661, 2010 | 41 | 2010 |
Video compression techniques: An overview M Abomhara, OO Khalifa, O Zakaria, AA Zaidan, BB Zaidan, A Rame Journal of Applied Sciences 10 (16), 1834-1840, 2010 | 35 | 2010 |
System and method for accurately sensing user location in an IoT system O Zakaria US Patent 9,704,318, 2017 | 34 | 2017 |