default search action
Rosli Salleh
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Nauman Khan, Zahid Khan, Anis Koubaa, Muhammad Khurram Khan, Rosli Bin Salleh:
Global insights and the impact of generative AI-ChatGPT on multidisciplinary: a systematic review and bibliometric analysis. Connect. Sci. 36(1) (2024) - 2023
- [j26]Nauman Khan, Rosli Bin Salleh, Anis Koubaa, Zahid Khan, Muhammad Khurram Khan, Ihsan Ali:
Data plane failure and its recovery techniques in SDN: A systematic literature review. J. King Saud Univ. Comput. Inf. Sci. 35(3): 176-201 (2023) - [j25]Nauman Khan, Rosli Bin Salleh, Zahid Khan, Anis Koubaa, Mosab Hamdan, Ahmed M. Abdelmoniem:
Ensuring reliable network operations and maintenance: The role of PMRF for switch maintenance and upgrades in SDN. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101809 (2023) - 2022
- [j24]Hadi Naghavipour, Tey Kok Soon, Mohd Yamani Idna Bin Idris, Morteza Namvar, Rosli Bin Salleh, Abdullah Gani:
Hybrid Metaheuristics for QoS-Aware Service Composition: A Systematic Mapping Study. IEEE Access 10: 12678-12701 (2022) - [j23]Hadi Naghavipour, Mohd Yamani Idna Bin Idris, Tey Kok Soon, Rosli Bin Salleh, Abdullah Gani:
Hybrid Metaheuristics Using Rough Sets for QoS-Aware Service Composition. IEEE Access 10: 112609-112628 (2022) - [j22]Nor Bakiah Abd Warif, Mohd Yamani Idna Bin Idris, Ainuddin Wahid Abdul Wahab, Nor Syahidatul Nadiah Binti Ismail, Rosli Salleh:
A comprehensive evaluation procedure for copy-move forgery detection methods: results from a systematic review. Multim. Tools Appl. 81(11): 15171-15203 (2022) - [j21]Nura Modi Shagari, Rosli Bin Salleh, Ismail Ahmedy, Mohd Yamani Idna Bin Idris, Ghulam Murtaza, Usman Ali, Salisu Modi:
A two-step clustering to minimize redundant transmission in wireless sensor network using sleep-awake mechanism. Wirel. Networks 28(5): 2077-2104 (2022) - 2021
- [j20]Noman Mazhar, Rosli Salleh, Muhammad Zeeshan, M. Muzaffar Hameed:
Role of Device Identification and Manufacturer Usage Description in IoT Security: A Survey. IEEE Access 9: 41757-41786 (2021) - [j19]Nura Modi Shagari, Mohd Yamani Idna Bin Idris, Rosli Bin Salleh, Ismail Ahmedy, Ghulam Murtaza, Aznul Qalid Md Sabri:
A hybridization strategy using equal and unequal clustering schemes to mitigate idle listening for lifetime maximization of wireless sensor network. Wirel. Networks 27(4): 2641-2670 (2021) - 2020
- [j18]Nura Modi Shagari, Mohd Yamani Idna Bin Idris, Rosli Bin Salleh, Ismail Ahmedy, Ghulam Murtaza, Hisham A. Shehadeh:
Heterogeneous Energy and Traffic Aware Sleep-Awake Cluster-Based Routing Protocol for Wireless Sensor Network. IEEE Access 8: 12232-12252 (2020) - [c10]Nada Alasbali, Saaidal Razalli Azzuhri, Rosli Salleh:
A Blockchain-Based Smart Network for IoT-Driven Smart Cities. IECC 2020: 17-23
2010 – 2019
- 2019
- [j17]Abubakar Bello Tambawal, Rafidah Md. Noor, Rosli Salleh, Christopher Chembe, Mohammad Hossein Anisi, Michael Oche, Jaime Lloret:
Time division multiple access scheduling strategies for emerging vehicular ad hoc network medium access control protocols: a survey. Telecommun. Syst. 70(4): 595-616 (2019) - 2018
- [j16]Hamid Tahaei, Rosli Bin Salleh, Mohd Faizal Ab Razak, Kwangman Ko, Nor Badrul Anuar:
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario. IEEE Access 6: 5182-5198 (2018) - [j15]Waqar Khurshid, Miss Laiha Mat Kiah, Imran Ali Khan, Rosli Salleh, Anthony Theodore Chronopoulos, Sajjad Ahmad Madani:
Comparative study of congestion notification techniques for hop-by-hop-based flow control in data centre Ethernet. IET Networks 7(4): 248-257 (2018) - 2017
- [j14]Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Guillermo Suarez-Tangil, Steven Furnell:
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. Comput. Secur. 65: 121-134 (2017) - [j13]Kimberly Tam, Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Lorenzo Cavallaro:
The Evolution of Android Malware and Android Analysis Techniques. ACM Comput. Surv. 49(4): 76:1-76:41 (2017) - [j12]Nor Bakiah Abd Warif, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Rosli Salleh, Fazidah Othman:
SIFT-Symmetry: A robust detection method for copy-move forgery with reflection attack. J. Vis. Commun. Image Represent. 46: 219-232 (2017) - 2016
- [j11]Mohd Faizal Ab Razak, Nor Badrul Anuar, Rosli Salleh, Ahmad Firdaus:
The rise of "malware": Bibliometric analysis of malware study. J. Netw. Comput. Appl. 75: 58-76 (2016) - [j10]Nor Bakiah Abd Warif, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Bin Idris, Roziana Ramli, Rosli Salleh, Shahaboddin Shamshirband, Kim-Kwang Raymond Choo:
Copy-move forgery detection: Survey, challenges and future directions. J. Netw. Comput. Appl. 75: 259-278 (2016) - [j9]Ahmad Karim, Rosli Salleh, Muhammad Khurram Khan, Aisha Siddiqa, Kim-Kwang Raymond Choo:
On the Analysis and Detection of Mobile Botnet Applications. J. Univers. Comput. Sci. 22(4): 567-588 (2016) - [j8]Hero Modares, Amirhosein Moravejosharieh, Jaime Lloret, Rosli Bin Salleh:
A Survey on Proxy Mobile IPv6 Handover. IEEE Syst. J. 10(1): 208-217 (2016) - 2015
- [j7]Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Ainuddin Wahid Abdul Wahab:
A review on feature selection in mobile malware detection. Digit. Investig. 13: 22-37 (2015) - [j6]Ahmad Karim, Syed Adeel Ali Shah, Rosli Bin Salleh, Muhammad Arif, Rafidah Md Noor, Shahaboddin Shamshirband:
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues. KSII Trans. Internet Inf. Syst. 9(4): 1471-1492 (2015) - [c9]Mehdi Hussain, Ainuddin Wahid Abdul Wahab, Nor Badrul Anuar, Rosli Salleh, Rafidah Md Noor:
Pixel value differencing steganography techniques: Analysis and open challenge. ICCE-TW 2015: 21-22 - [c8]Ahmad Karim, Rosli Salleh, Syed Adeel Ali Shah:
DeDroid: A Mobile Botnet Detection Approach Based on Static Analysis. UIC/ATC/ScalCom 2015: 1327-1332 - 2014
- [j5]Hero Modares, Amirhosein Moravejosharieh, Jaime Lloret, Rosli Salleh:
A survey of secure protocols in Mobile IPv6. J. Netw. Comput. Appl. 39: 351-368 (2014) - [j4]Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar:
Botnet detection techniques: review, future trends, and issues. J. Zhejiang Univ. Sci. C 15(11): 943-983 (2014) - [c7]Ali Feizollah, Nor Badrul Anuar, Rosli Salleh, Fairuz Amalina:
Comparative study of k-means and mini batch k-means clustering algorithms in android malware detection using network traffic analysis. ISBAST 2014: 193-197 - [c6]Ahmad Karim, Syed Adeel Ali Shah, Rosli Salleh:
Mobile Botnet Attacks: A Thematic Taxonomy. WorldCIST (2) 2014: 153-164 - 2013
- [j3]Mohammad Reza Hosseiny Fatemi, Hasan F. Ates, Rosli Salleh:
Analysis and Design of Low-Cost Bit-Serial Architectures for Motion Estimation in H.264/AVC. J. Signal Process. Syst. 71(2): 111-121 (2013) - [c5]Ali Feizollah, Shahaboddin Shamshirband, Nor Badrul Anuar, Rosli Salleh, Miss Laiha Mat Kiah:
Anomaly Detection Using Cooperative Fuzzy Logic Controller. FIRA 2013: 220-231 - [c4]Elham Babaee, Sepideh Zareei, Rosli Salleh:
Best Path Cluster-Based Routing Protocol for Wireless Sensor Networks. UKSim 2013: 663-667 - 2012
- [j2]Mohammad Reza Hosseiny Fatemi, Hasan F. Ates, Rosli Salleh:
A Survey of Algorithms and Architectures for H.264 Sub-Pixel Motion Estimation. J. Circuits Syst. Comput. 21(3) (2012) - [c3]Hero Modares, Amirhossein Moravejosharieh, Hassan Keshavarz, Rosli Salleh:
Protection of Binding Update Message in Mobile IPv6. EMS 2012: 444-447 - [i2]Hassan Keshavarz, Ghaith A. Abdulwahed, Rosli Salleh, Laeth A. Abdul Wahid:
Eliminating Scanning Delay using Advanced Neighbor Discovery with Caching (ANDWC). CoRR abs/1206.5210 (2012) - [i1]Hero Modares, Rosli Salleh, Amirhosein Moravejosharieh, Hassan Keshavarz, Majid Talebi Shahgoli:
A Survey on Cloud Computing Security. CoRR abs/1206.5468 (2012) - 2010
- [j1]Mohammad Reza Hosseiny Fatemi, Hasan F. Ates, Rosli Salleh:
Fast Algorithm Analysis and Bit-Serial Architecture Design for Sub-Pixel Motion Estimation in H.264. J. Circuits Syst. Comput. 19(8): 1665-1687 (2010)
2000 – 2009
- 2008
- [c2]Mohammad Reza Hosseiny Fatemi, Hasan F. Ates, Rosli Salleh:
A Cost-Efficient Bit-Serial Architecture for Sub-pixel Motion Estimation of H.264/AVC. IIH-MSP 2008: 818-821 - 2005
- [c1]Zaidi Razak, Rosli Salleh, Mashkuri Yaacob:
Hardware Design of On-Line Jawi Character Recognition Chip using Discrete Wavelet Transform. ICDAR 2005: 91-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-03 21:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint