default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Exact matches
- Azizah Abdul Manaf
aka: Azizah Abd Manaf, Azizah Bt Abdul Manaf, Azizah A. Manaf
Universiti Teknologi Malaysia
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 55 matches
- 2023
- Nafees Mansoor, Kaniz Fatema Antora, Priyata Deb, Tarek Ahammed Arman, Azizah Abdul Manaf, Mahdi Zareei:
A Review of Blockchain Approaches for KYC. IEEE Access 11: 121013-121042 (2023) - 2022
- Urmila Pilania, Rohit Tanwar, Mazdak Zamani, Azizah Abdul Manaf:
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression. Future Internet 14(9): 254 (2022) - 2021
- Khaled Gubran Al-Hashedi, Pritheega Magalingam, Nurazean Maarop, Ganthan Narayana Samy, Azizah Abdul Manaf:
A Conceptual Model to Identify Illegal Activities on the Bitcoin System. ACeS 2021: 18-34 - 2020
- Mehrbakhsh Nilashi, Hossein Ahmadi, Azizah Abdul Manaf, Tarik A. Rashid, Sarminah Samad, Leila Shahmoradi, Nahla Aljojo, Elnaz Akbari:
Coronary Heart Disease Diagnosis Through Self-Organizing Map and Fuzzy Support Vector Machine with Incremental Updates. Int. J. Fuzzy Syst. 22(4): 1376-1388 (2020) - Omnia Abdullah Alharbi, Asia Othman Aljahdali, Azizah Abdul Manaf:
A Robust Double Layer Steganography Technique Based on DNA Sequences. ICFNDS 2020: 38:1-38:5 - AbdulAleem Al-Othmani, Azizah Abdul Manaf, Akram M. Zeki, Qusay Al-Maatouk, Abdulaziz Aborujilah, Maen T. Al-Rashdan:
Correlation Between Speaker Gender and Perceptual Quality of Mobile Speech Signal. IMCOM 2020: 1-6 - 2019
- Mehrbakhsh Nilashi, Sarminah Samad, Azizah Abdul Manaf, Hossein Ahmadi, Tarik A. Rashid, Asmaa Munshi, Wafa Almukadi, Othman Ibrahim, Omed Hassan Ahmed:
Factors influencing medical tourism adoption in Malaysia: A DEMATEL-Fuzzy TOPSIS approach. Comput. Ind. Eng. 137 (2019) - Tanya Koohpayeh Araghi, Azizah Abd Manaf:
An enhanced hybrid image watermarking scheme for security of medical and non-medical images based on DWT and 2-D SVD. Future Gener. Comput. Syst. 101: 1223-1246 (2019) - 2018
- Tanya Koohpayeh Araghi, Azizah Abd Manaf, Ala Abdulsalam Alarood, Azida Binti Zainol:
Host Feasibility Investigation to Improve Robustness in Hybrid DWT+SVD Based Image Watermarking Schemes. Adv. Multim. 2018: 1609378:1-1609378:9 (2018) - Tanya Koohpayeh Araghi, Azizah Abd Manaf, Sagheb Kohpayeh Araghi:
A secure blind discrete wavelet transform based watermarking scheme using two-level singular value decomposition. Expert Syst. Appl. 112: 208-228 (2018) - Saman Shojae Chaeikar, Mazdak Zamani, Azizah Bt Abdul Manaf, Akram M. Zeki:
PSW statistical LSB image steganalysis. Multim. Tools Appl. 77(1): 805-835 (2018) - 2017
- Seyed Mojtaba Mousavi, Alireza Naghsh, Azizah A. Manaf, S. A. R. Abu-Bakar:
A robust medical image watermarking against salt and pepper noise for brain MRI images. Multim. Tools Appl. 76(7): 10313-10342 (2017) - Ali A. Elrowayati, Mohammad Faiz Liew Abdullah, Azizah Abd Manaf, Abdalrahman S. Alfagi:
Tampering detection of double-compression with the same quantization parameter in HEVC video streams. ICCSCE 2017: 174-179 - Sajjad Dadkhah, Mario Köppen, Hamid Abdullah Jalab, Somayeh Sadeghi, Azizah Abdul Manaf, Diaa M. Uliyan:
Electromagnetismlike Mechanism Descriptor with Fourier Transform for a Passive Copy-move Forgery Detection in Digital Image Forensics. ICPRAM 2017: 612-619 - Sajjad Dadkhah, Mario Köppen, Somayeh Sadeghi, Kaori Yoshida, Hamid Abdullah Jalab, Azizah Abdul Manaf:
An efficient ward-based copy-move forgery detection method for digital image forensic. IVCNZ 2017: 1-6 - 2016
- Farnaz Arab, Shahidan M. Abdullah, Siti Zaiton Mohd Hashim, Azizah Abdul Manaf, Mazdak Zamani:
A robust video watermarking technique for the tamper detection of surveillance systems. Multim. Tools Appl. 75(18): 10855-10885 (2016) - 2015
- Farzad Kiani, Ehsan Amiri, Mazdak Zamani, Touraj Khodadadi, Azizah Abdul Manaf:
Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 618072:1-618072:13 (2015) - Mazdak Zamani, Azizah Bt Abdul Manaf:
Genetic algorithm for fragile audio watermarking. Telecommun. Syst. 59(3): 291-304 (2015) - Nor Fatimah Bt. Awang, Azizah Abd Manaf:
Automated Security Testing Framework for Detecting SQL Injection Vulnerability in Web Application. ICGS3 2015: 160-171 - Taniza Binti Tajuddin, Azizah Abd Manaf:
Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone. WorldCIS 2015: 132-138 - 2014
- Sajjad Dadkhah, Azizah Abd Manaf, Yoshiaki Hori, Aboul Ella Hassanien, Somayeh Sadeghi:
An effective SVD-based image tampering detection and self-recovery using active watermarking. Signal Process. Image Commun. 29(10): 1197-1210 (2014) - Mahdi Sharifi, Azizah Abdul Manaf, Ali Memariani, Homa Movahednejad, Amir Vahid Dastjerdi:
Consensus-Based Service Selection Using Crowdsourcing Under Fuzzy Preferences of Users. IEEE SCC 2014: 17-26 - Mahdi Sharifi, Azizah Abdul Manaf, Ali Memariani, Homa Movahednejad, Haslina Md Sarkan, Amir Vahid Dastjerdi:
Multi-criteria Consensus-Based Service Selection Using Crowdsourcing. AINA Workshops 2014: 114-120 - Ala Abdulhakim Alariki, Azizah Abdul Manaf:
Investigation of Touch-Based User Authentication Features Using Android Smartphone. AMLTA 2014: 135-144 - Nor Fatimah Bt. Awang, Azizah Abdul Manaf, Wan Shafiuddin Zainudin:
A Survey on Conducting Vulnerability Assessment in Web-Based Application. AMLTA 2014: 459-471 - Mohammed A. Saleh, Azizah Abdul Manaf:
Protective Frameworks and Schemes to Detect and Prevent High Rate DoS/DDoS and Flash Crowd Attacks: A Comprehensive Review. AMLTA 2014: 145-152 - Iman Ahmeid Mohamed, Azizah Bt Abdul Manaf:
An enhancement of traceability model based-on scenario for digital forensic investigation process. CyberSec 2014: 12-15 - Sajjad Dadkhah, Azizah Abd Manaf, Somayeh Sadeghi:
An Efficient Image Self-recovery and Tamper Detection Using Fragile Watermarking. ICIAR (1) 2014: 504-513 - Mohammed A. Saleh, Azizah Abdul Manaf:
Optimal specifications for a protective framework against HTTP-based DoS and DDoS attacks. ISBAST 2014: 263-267 - Sajjad Dadkhah, Azizah Abd Manaf, Somayeh Sadeghi:
Efficient Image Authentication and Tamper Localization Algorithm Using Active Watermarking. Bio-inspiring Cyber Security and Cloud Services 2014: 115-148
skipping 25 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-31 11:42 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint