Bil |
Title |
Corresponding Authors |
1 |
A bibliometric and content analysis of technological advancement applications in agricultural e-commerce |
Altarturi, HHM (Altarturi, Hamza H. M.) [1] ; Nor, ARM (Nor, Adibi Rahiman Md) [2] ; Jaafar, NI (Jaafar, Noor Ismawati) [3] ; Anuar, NB (Anuar, Nor Badrul) [1] |
2 |
Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade |
Alsehani, Fayez Nahedh; Wahab, Ainuddin Wahid Bin Abdul; Shuib, Liyana |
3 |
Mobile Phone Data: A Survey of Techniques, Features, and Applications |
Okmi, M (Okmi, Mohammed) [1] , [2] ; Por, LY (Por, Lip Yee) [1] ; Ang, TF (Ang, Tan Fong) [1] ; Ku, CS (Ku, Chin Soon) [3] |
4 |
Utilization Of Mobile Augmented Reality In A Course Content: An Impact Study |
AL-Amri, Saud; Hamid, Suraya; Noor, Nurul Fazmidar Mohd; Gani, Abdullah |
5 |
Characteristics of Blockchain and Its Relationship With Trust |
Ali, V (Ali, Vizaad) [1] ; Norman, AA (Norman, Azah Anir) [1] ; Azzuhri, SRB (Azzuhri, Saaidal Razalli Bin) [2] |
6 |
Secure PIN-Entry Method Using One-Time PIN (OTP) |
Binbeshr, F (Binbeshr, Farid) [1] , [2] ; Por, LY (Por, Lip Yee) [1] ; Kiah, MLM (Kiah, M. L. Mat) [1] ; Zaidan, AA (Zaidan, A. A.) [3] ; Imam, M (Imam, Muhammad) [4] |
7 |
Factors influencing the elderly's behavioural intention to use smart home technologies in Saudi Arabia |
Maswadi, K (Maswadi, Kholoud) [1] , [2] ; Ghani, NA (Ghani, Norjihan Abdul) [1] ; Hamid, S (Hamid, Suraya) [1] |
8 |
Emerging Technology for Healthy Lifestyle of the Middle-Age and Elderly: A Scoping Review |
Hamid, S (Hamid, Suraya) [1] ; Faith, F (Faith, Fatokun) [1] ; Jaafar, Z (Jaafar, Zulkarnain) [2] ; Ghani, NA (Ghani, Norjihan Abdul) [1] ; Yusop, FD (Yusop, Farrah Dina) [3] |
9 |
Employees' BYOD Security Policy Compliance in the Public Sector |
Palanisamy, Rathika; Norman, Azah Anir; Kiah, Miss Laiha Mat |
10 |
Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern |
Samsudin, Siti Salbiah; Arof, Hamzah; Harun, Sulaiman Wadi; Wahab, Ainuddin Wahid Abdul; Idris, Mohd Yamani Idna |
11 |
The rise of website fingerprinting on Tor: Analysis on techniques and assumptions |
Zaki, F; Anuar, NB; |
12 |
A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions |
Zaki, F; Anuar, NB; |
13 |
Data plane failure and its recovery techniques in SDN: A systematic literature review |
han, N (Khan, Nauman) [1] , [2] ; bin Salleh, R (bin Salleh, Rosli) [1] ; Koubaa, A (Koubaa, Anis) [3] ; Khan, Z (Khan, Zahid) [3] ; Khan, MK (Khan, Muhammad Khurram) [4] ; Ali, I (Ali, Ihsan) [1] |
14 |
RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things |
han, N (Khan, Nauman) [1] , [2] ; bin Salleh, R (bin Salleh, Rosli) [1] ; Koubaa, A (Koubaa, Anis) [3] ; Khan, Z (Khan, Zahid) [3] ; Khan, MK (Khan, Muhammad Khurram) [4] ; Ali, I (Ali, Ihsan) [1] |
15 |
Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption |
Alexan, Wassim; Chen, Yen-Lin; Por, Lip Yee; Gabr, Mohamed |
16 |
A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations |
Alshahrani, NM; Kiah, MLM; Saif, A |
17 |
A Systematic Literature Review of Information Security in Chatbots |
Yang, Jing; Chen, Yen-Lin; Por, Lip Yee; Ku, Chin Soon |
18 |
Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment |
Ayedh, MAT (Ayedh, M. Aljuaid Turkea); Wahab, AWA (Wahab, Ainuddin Wahid Abdul); Idris, MYI (Idris, Mohd Yamani Idna) |
19 |
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection |
Jimale, MA (Jimale, Mohamud Ahmed) [1] ; Abdullah, NA (Abdullah, Nor Aniza) [1] ; Kiah, MLBM (Kiah, Miss Laiha Binti Mat) [1] ; Idris, MYI (Idris, Mohd Yamani Idna) [1] ; Z'Aba, MR (Z'Aba, Muhammad Reza) [2] ; Jamil, N (Jamil, Norziana) [3] ; Rohmad, MS (Rohmad, Mohd Saufy) [4] |
20 |
Rewarding Developers by Storing Applications on Non-Fungible Tokens |
Kalhoro, A (Kalhoro, Ayesha) [1] ; Wagan, AA (Wagan, Asif Ali) [1] ; Khan, AA (Khan, Abdullah Ayub) [1] , [2] ; Lin, JM (Lin, Jim-Min) [3] ; Ku, CS (Ku, Chin Soon) [4] ; Por, LY (Por, Lip Yee) [5] ; Yang, J (Yang, Jing) [5] |
21 |
OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification |
Hameed, MM (Hameed, M. Muzaffar) [1] , [2] ; Ahmad, R (Ahmad, Rodina) [1] ; Kiah, LM (Kiah, Laiha Mat) [1] ; Murtaza, G (Murtaza, Ghulam) [3] ; Mazhar, N (Mazhar, Noman) [1] |
22 |
Web content topic modeling using LDA and HTML tags |
Altarturi, Hamza H. M.; Saadoon, Muntadher; Anuar, Nor Badrul |
23 |
Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions |
Ayedh, Aljuaid Turkea M.; Wahab, Ainuddin Wahid Abdul; Idris, Mohd Yamani Idna |
24 |
Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges |
Norman, Azah Anir; Marzuki, Athirah Husna; Faith, Fatokun; Hamid, Suraya; Ghani, Norjihan Abdul; Ravana, Sri Devi; Arshad, Noreen Izza |
25 |
An Automated Precise Authentication of Vehicles for Enhancing the Visual Security Protocols |
Roy, Kumarmangal; Ahmad, Muneer; Ghani, Norjihan Abdul; Uddin, Jia; Shin, Jungpil |
26 |
Exploring Manet Security Aspects: Analysis Of Attacks And Node Misbehaviour Issues |
Khan, Burhan Ul Islam; Anwar, Farhat; Rahman, Farah Diyana Bt. Abdul; Olanrewaju, Rashidah Funke; Kiah, Laiha B. Mat; Rahman, Md Arafatur; Janin, Zuriati |
27 |
An Empirical Examination of Formation of Trust in Blockchain |
Ali, V (Ali, Vizaad) [1] ; Norman, AA (Norman, Azah Anir) [1] ; Azzuhri, SRB (Azzuhri, Saaidal Razalli Bin) [2] |
28 |
The rise of user profiling in social media: review, challenges and future direction |
Gilbert, Justin; Hamid, Suraya; Hashem, Ibrahim Abaker Targio; Ghani, Norjihan Abdul; Boluwatife, Fatokun Faith |
29 |
A Comprehensive Review of Cyberbullying-related Content Classification In Online Social Media |
Teoh Hwai Teng, Kasturi Dewi Varathan, Fabio Crestani b |
30 |
Scalability Improvement Of Active Probing For Failure Detection In Large-Scale Software Defined Networks Using Community Detection Algorithms |
Sahran, F (Sahran, Firdaus) [1]; Anuar, NB (Anuar, Nor Badrul) [1] |