A new hybrid digital chaotic system with applications in image encryption M Alawida, A Samsudin, JS Teh, RS Alkhawaldeh Signal Processing 160, 45-58, 2019 | 384 | 2019 |
An image encryption scheme based on hybridizing digital chaos and finite state machine M Alawida, JS Teh, A Samsudin Signal Processing 164, 249-266, 2019 | 159 | 2019 |
A symmetric image encryption scheme based on combination of nonlinear chaotic maps A Akhavan, A Samsudin, A Akhshani Journal of the Franklin Institute 348 (8), 1797-1813, 2011 | 111 | 2011 |
Aesthetic measures for assessing graphic screens DCL Ngo, A Samsudin, R Abdullah J. Inf. Sci. Eng. 16 (1), 97-116, 2000 | 104 | 2000 |
Cryptanalysis of an image encryption algorithm based on DNA encoding A Akhavan, A Samsudin, A Akhshani Optics & Laser Technology 95, 94-99, 2017 | 96 | 2017 |
Enhanced digital chaotic maps based on bit reversal with applications in random bit generators M Alawida, A Samsudin, JS Teh Information Sciences 512, 1155-1169, 2020 | 87 | 2020 |
Integrity verification for digital Holy Quran verses using cryptographic hash function and compression M Almazrooie, A Samsudin, AAA Gutub, MS Salleh, MA Omar, SA Hassan Journal of King Saud University-Computer and Information Sciences 32 (1), 24-34, 2020 | 82 | 2020 |
Quantum reversible circuit of AES-128 M Almazrooie, A Samsudin, R Abdullah, KN Mutter Quantum information processing 17, 1-30, 2018 | 81 | 2018 |
Parallel chaotic hash function based on the shuffle-exchange network JS Teh, A Samsudin, A Akhavan Nonlinear Dynamics 81, 1067-1079, 2015 | 72 | 2015 |
Digital cosine chaotic map for cryptographic applications M Alawida, A Samsudin, JS Teh IEEE Access 7, 150609-150622, 2019 | 71 | 2019 |
Recent technologies, security countermeasure and ongoing challenges of Industrial Internet of Things (IIoT): A survey SF Tan, A Samsudin Sensors 21 (19), 6647, 2021 | 69 | 2021 |
A novel parallel hash function based on 3D chaotic map A Akhavan, A Samsudin, A Akhshani EURASIP Journal on Advances in Signal Processing 2013, 1-12, 2013 | 65 | 2013 |
Cryptanalysis of “an improvement over an image encryption method based on total shuffling” A Akhavan, A Samsudin, A Akhshani Optics Communications 350, 77-82, 2015 | 58 | 2015 |
An integrated architecture for maintaining security in cloud computing based on blockchain R Awadallah, A Samsudin, JS Teh, M Almazrooie IEEE Access 9, 69513-69526, 2021 | 56 | 2021 |
Image encryption based on the Jacobian elliptic maps S Behnia, A Akhavan, A Akhshani, A Samsudin Journal of Systems and Software 86 (9), 2429-2438, 2013 | 56 | 2013 |
Enhancing unimodal digital chaotic maps through hybridisation M Alawida, A Samsudin, JS Teh Nonlinear Dynamics 96, 601-613, 2019 | 53 | 2019 |
Hash function based on piecewise nonlinear chaotic map A Akhavan, A Samsudin, A Akhshani Chaos, Solitons & Fractals 42 (2), 1046-1053, 2009 | 49 | 2009 |
A novel dynamic model of pseudo random number generator S Behnia, A Akhavan, A Akhshani, A Samsudin Journal of Computational and Applied Mathematics 235 (12), 3455-3463, 2011 | 48 | 2011 |
Grid-based intrusion detection system OT Choon, A Samsudin 9th Asia-Pacific Conference on Communications (IEEE Cat. No. 03EX732) 3 …, 2003 | 45 | 2003 |
Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment LL Bann, MM Singh, A Samsudin Procedia Computer Science 72, 129-136, 2015 | 42 | 2015 |