default search action
Raniyah Wazirali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Rami Ahmad, Waseem Alhasan, Raniyah Wazirali, Noura Aleisa:
Optimization Algorithms for Wireless Sensor Networks Node Localization: An Overview. IEEE Access 12: 50459-50488 (2024) - [j14]Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad, Salwani Abdullah, Raniyah Wazirali:
Secured lightweight authentication for 6LoWPANs in machine-to-machine communications. Comput. Secur. 145: 104002 (2024) - 2023
- [j13]Rami Ahmad, Matti Hämäläinen, Raniyah Wazirali, Tarik Abu-Ain:
Digital-care in next generation networks: Requirements and future directions. Comput. Networks 224: 109599 (2023) - [j12]Khalid Alhusayni, Raniyah Wazirali, Mousa Alakhras, Marwah Almasri, Samah Alhazmi:
A Multi-Stage Secure IoT Authentication Protocol. Comput. Syst. Sci. Eng. 45(1): 459-481 (2023) - [j11]Waseem Alhasan, Rami Ahmad, Raniyah Wazirali, Noura Aleisa, Weaam Abo Shdeed:
Adaptive mean center of mass particle swarm optimizer for auto-localization in 3D wireless sensor networks. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101782 (2023) - [j10]Sohaib K. M. Abujayyab, Rania Almajalid, Raniyah Wazirali, Rami Ahmad, Enes Tasoglu, Ismail R. Karas, Ihab Hijazi:
Integrating object-based and pixel-based segmentation for building footprint extraction from satellite images. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101802 (2023) - [c5]Safaa Sharif Althagafi, Hajer Fahad Aljudiaibi, Badriah Abdelhadi Alharbi, Raniyah Wazirali:
Uses of Artificial Intelligence in Cyber Security to Mitigate DDOS. FTC (2) 2023: 550-565 - 2022
- [j9]Raniyah Wazirali, Rami Ahmed:
Hybrid Feature Extractions and CNN for Enhanced Periocular Identification During Covid-19. Comput. Syst. Sci. Eng. 41(1): 305-320 (2022) - [j8]Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain:
Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors 22(13): 4730 (2022) - 2021
- [j7]Raniyah Wazirali, Rami Ahmad, Ashraf Abdel-Karim Helal Abu-Ein:
Sustaining accurate detection of phishing URLs using SDN and feature selection approaches. Comput. Networks 201: 108591 (2021) - [j6]Raniyah Wazirali:
Aligning Education with Vision 2030 Using Augmented Reality. Comput. Syst. Sci. Eng. 36(2): 339-351 (2021) - [j5]Rami Ahmad, Raniyah Wazirali, Qusay Bsoul, Tarik Abu-Ain, Waleed Abdel Karim Abu-Ain:
Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs' Lifetime. Sensors 21(14): 4821 (2021)
2010 – 2019
- 2019
- [j4]Ranyiah Wazirali, Waleed Alasmary, Mohamed M. E. A. Mahmoud, Ahmad Alhindi:
An Optimized Steganography Hiding Capacity and Imperceptibly Using Genetic Algorithms. IEEE Access 7: 133496-133508 (2019) - 2017
- [j3]Raniyah Wazirali, Zenon Chaczko:
Anticipatory Quality Assessment Metric for Measuring Data Hiding Imperceptibility. J. Inf. Hiding Multim. Signal Process. 8(2): 404-412 (2017) - [c4]Zenon Chaczko, Raniyah Wazirali, Lucia Carrion Gordon, Wojciech Bozejko:
Steganographic Data Heritage Preservation Using Sharing Images App. EUROCAST (1) 2017: 150-156 - [c3]Raniyah Wazirali, Zenon Chaczko, Everlyn Chiang:
Steganographic Authentication in Cloud Storage for Mitigation of Security Risks. ICSEng 2017: 451-458 - [c2]Raniyah Wazirali, Zenon Chaczko, Jack Gibbon:
Steganographic Image Sharing App. ICSEng 2017: 494-499 - 2016
- [b1]Raniyah Wazirali:
Optimization of perceptual steganography capacity using the human visual system and evolutionary computation. University of Technology Sydney, Australia, 2016 - [j2]Raniyah Wazirali, Zenon Chaczko:
Hyper Edge Detection with Clustering for Data Hiding. J. Inf. Hiding Multim. Signal Process. 7(1): 1-10 (2016) - 2015
- [j1]Raniyah Wazirali, Zenon Chaczko:
Data Hiding Based on Intelligent Optimized Edges for Secure Multimedia Communication. J. Networks 10(8): 477-485 (2015) - [c1]Raniyah Wazirali, Zenon Chaczko:
Perceptual threshold in DWT for optimum embedding rate in data hiding using HVS and GA. IVCNZ 2015: 1-8 - [p1]Raniyah Wazirali, Zenon Chaczko, Lucia Carrion Gordon:
Bio-informatics with Genetic Steganography Technique. Computational Intelligence and Efficiency in Engineering Systems 2015: 333-345
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint