Bil |
Title |
Corresponding Authors |
1 |
Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade |
Alsehani F.N.; Wahab A.W.B.A.; Shuib L., |
2 |
Mobile Phone Data: A Survey of Techniques, Features, and Applications |
Okmi M., Por L.Y., Ang T.F., |
3 |
Characteristics of Blockchain and Its Relationship With Trust |
Ali V.; Norman A.A.; Azzuhri S.R.B., |
4 |
Fifteen years of YouTube scholarly research: knowledge structure, collaborative networks, and trending topics |
Feizollah A., Anuar N.B., |
5 |
ROOTECTOR: Robust Android Rooting Detection Framework Using Machine Learning Algorithms |
Elsersy W.F., Anuar N.B., Razak M.F.A., |
6 |
Secure PIN-Entry Method Using One-Time PIN (OTP) |
Binbeshr F., Por L.Y., Kiah M.L.M., |
7 |
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions |
Zaki F., Anuar N.B., |
8 |
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions |
Zaki F., Anuar N.B., |
9 |
A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions |
Okmi, M (Okmi, Mohammed) [1] , [2] ; Por, LY (Por, Lip Yee) [1] ; Ang, TF (Ang, Tan Fong) [1] ; Al-Hussein, W (Al-Hussein, Ward) [1] ; Ku, CS (Ku, Chin Soon) [3] |
10 |
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things |
Alansari, Zainab; Anuar, Nor Badrul; Kamsin, Amirrudin; Belgaum, Mohammad Riyaz |
11 |
Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption |
Alexan, Wassim; Chen, Yen-Lin; Por, Lip Yee; Gabr, Mohamed |
12 |
A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations |
Alshahrani, NM; Kiah, MLM; Saif, A |
13 |
A Systematic Literature Review of Information Security in Chatbots |
Yang, Jing; Chen, Yen-Lin; Por, Lip Yee; Ku, Chin Soon |
14 |
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection |
Jimale, MA (Jimale, Mohamud Ahmed) [1] ; Abdullah, NA (Abdullah, Nor Aniza) [1] ; Kiah, MLBM (Kiah, Miss Laiha Binti Mat) [1] ; Idris, MYI (Idris, Mohd Yamani Idna) [1] ; Z'Aba, MR (Z'Aba, Muhammad Reza) [2] ; Jamil, N (Jamil, Norziana) [3] ; Rohmad, MS (Rohmad, Mohd Saufy) [4]/td>
|
15 |
OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification |
Hameed, MM (Hameed, M. Muzaffar) [1] , [2] ; Ahmad, R (Ahmad, Rodina) [1] ; Kiah, LM (Kiah, Laiha Mat) [1] ; Murtaza, G (Murtaza, Ghulam) [3] ; Mazhar, N (Mazhar, Noman) [1] |
16 |
Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions |
Ayedh, Aljuaid Turkea M.; Wahab, Ainuddin Wahid Abdul; Idris, Mohd Yamani Idna |
17 |
Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges |
Norman, Azah Anir; Marzuki, Athirah Husna; Faith, Fatokun; Hamid, Suraya; Ghani, Norjihan Abdul; Ravana, Sri Devi; Arshad, Noreen Izza |
18 |
An Automated Precise Authentication of Vehicles for Enhancing the Visual Security Protocols |
Roy, Kumarmangal; Ahmad, Muneer; Ghani, Norjihan Abdul; Uddin, Jia; Shin, Jungpil |
19 |
Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment |
Ayedh, MAT (Ayedh, M. Aljuaid Turkea); Wahab, AWA (Wahab, Ainuddin Wahid Abdul); Idris, MYI (Idris, Mohd Yamani Idna) |
20 |
An Machine learning approach for detecting and combating bring your own device (BYOD) security threats and attacks: a systematic mapping review |
Eke C.I.; Norman A.A.; |
21 |
Exploring Manet Security Aspects: Analysis Of Attacks And Node Misbehaviour Issues |
Khan, Burhan Ul Islam; Anwar, Farhat; Rahman, Farah Diyana Bt. Abdul; Olanrewaju, Rashidah Funke; Kiah, Laiha B. Mat; Rahman, Md Arafatur; Janin, Zuriati |
22 |
A An Empirical Examination of Formation of Trust in Blockchain |
Ali, V (Ali, Vizaad) [1] ; Norman, AA (Norman, Azah Anir) [1] ; Azzuhri, SRB (Azzuhri, Saaidal Razalli Bin) [2] |
23 |
The rise of user profiling in social media: review, challenges and future direction |
Gilbert, Justin; Hamid, Suraya; Hashem, Ibrahim Abaker Targio; Ghani, Norjihan Abdul; Boluwatife, Fatokun Faith |
24 |
R3-Rescale, Rotate, and Randomize: A Novel Image Cryptosystem Utilizing Chaotic and Hyper-Chaotic Systems |
Gabr, M (Gabr, Mohamed) [1] ; Korayem, Y (Korayem, Yousef) [1] ; Chen, YL (Chen, Yen-Lin) [2] ; Yee, PL (Yee, Por Lip) [3] ; Ku, CS (Ku, Chin Soon) [4] ; Alexan, W (Alexan, Wassim) [5] , [6] |
25 |
Exploring the Landscape of AI-SDN: A Comprehensive Bibliometric Analysis and Future Perspectives |
Sahran, F (Sahran, Firdaus) [1]; Altarturi, HHM (Altarturi, Hamza H. M.) [1] ; Anuar, NB (Anuar, Nor Badrul) [1] |