| Bil | Title | Corresponding Authors |
|---|---|---|
| 1 | A bibliometric and content analysis of technological advancement applications in agricultural e-commerce | Altarturi, HHM (Altarturi, Hamza H. M.) [1] ; Nor, ARM (Nor, Adibi Rahiman Md) [2] ; Jaafar, NI (Jaafar, Noor Ismawati) [3] ; Anuar, NB (Anuar, Nor Badrul) [1] |
| 2 | Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade | Alsehani, Fayez Nahedh; Wahab, Ainuddin Wahid Bin Abdul; Shuib, Liyana |
| 3 | Mobile Phone Data: A Survey of Techniques, Features, and Applications | Okmi, M (Okmi, Mohammed) [1] , [2] ; Por, LY (Por, Lip Yee) [1] ; Ang, TF (Ang, Tan Fong) [1] ; Ku, CS (Ku, Chin Soon) [3] |
| 4 | Utilization Of Mobile Augmented Reality In A Course Content: An Impact Study | AL-Amri, Saud; Hamid, Suraya; Noor, Nurul Fazmidar Mohd; Gani, Abdullah |
| 5 | Characteristics of Blockchain and Its Relationship With Trust | Ali, V (Ali, Vizaad) [1] ; Norman, AA (Norman, Azah Anir) [1] ; Azzuhri, SRB (Azzuhri, Saaidal Razalli Bin) [2] |
| 6 | Secure PIN-Entry Method Using One-Time PIN (OTP) | Binbeshr, F (Binbeshr, Farid) [1] , [2] ; Por, LY (Por, Lip Yee) [1] ; Kiah, MLM (Kiah, M. L. Mat) [1] ; Zaidan, AA (Zaidan, A. A.) [3] ; Imam, M (Imam, Muhammad) [4] |
| 7 | Factors influencing the elderly's behavioural intention to use smart home technologies in Saudi Arabia | Maswadi, K (Maswadi, Kholoud) [1] , [2] ; Ghani, NA (Ghani, Norjihan Abdul) [1] ; Hamid, S (Hamid, Suraya) [1] |
| 8 | Emerging Technology for Healthy Lifestyle of the Middle-Age and Elderly: A Scoping Review | Hamid, S (Hamid, Suraya) [1] ; Faith, F (Faith, Fatokun) [1] ; Jaafar, Z (Jaafar, Zulkarnain) [2] ; Ghani, NA (Ghani, Norjihan Abdul) [1] ; Yusop, FD (Yusop, Farrah Dina) [3] |
| 9 | Employees' BYOD Security Policy Compliance in the Public Sector | Palanisamy, Rathika; Norman, Azah Anir; Kiah, Miss Laiha Mat |
| 10 | Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern | Samsudin, Siti Salbiah; Arof, Hamzah; Harun, Sulaiman Wadi; Wahab, Ainuddin Wahid Abdul; Idris, Mohd Yamani Idna |
| 11 | The rise of website fingerprinting on Tor: Analysis on techniques and assumptions | Zaki, F; Anuar, NB; |
| 12 | A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions | Zaki, F; Anuar, NB; |
| 13 | Data plane failure and its recovery techniques in SDN: A systematic literature review | han, N (Khan, Nauman) [1] , [2] ; bin Salleh, R (bin Salleh, Rosli) [1] ; Koubaa, A (Koubaa, Anis) [3] ; Khan, Z (Khan, Zahid) [3] ; Khan, MK (Khan, Muhammad Khurram) [4] ; Ali, I (Ali, Ihsan) [1] |
| 14 | RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things | han, N (Khan, Nauman) [1] , [2] ; bin Salleh, R (bin Salleh, Rosli) [1] ; Koubaa, A (Koubaa, Anis) [3] ; Khan, Z (Khan, Zahid) [3] ; Khan, MK (Khan, Muhammad Khurram) [4] ; Ali, I (Ali, Ihsan) [1] |
| 15 | Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption | Alexan, Wassim; Chen, Yen-Lin; Por, Lip Yee; Gabr, Mohamed |
| 16 | A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations | Alshahrani, NM; Kiah, MLM; Saif, A |
| 17 | A Systematic Literature Review of Information Security in Chatbots | Yang, Jing; Chen, Yen-Lin; Por, Lip Yee; Ku, Chin Soon |
| 18 | Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment | Ayedh, MAT (Ayedh, M. Aljuaid Turkea); Wahab, AWA (Wahab, Ainuddin Wahid Abdul); Idris, MYI (Idris, Mohd Yamani Idna) |
| 19 | Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection | Jimale, MA (Jimale, Mohamud Ahmed) [1] ; Abdullah, NA (Abdullah, Nor Aniza) [1] ; Kiah, MLBM (Kiah, Miss Laiha Binti Mat) [1] ; Idris, MYI (Idris, Mohd Yamani Idna) [1] ; Z'Aba, MR (Z'Aba, Muhammad Reza) [2] ; Jamil, N (Jamil, Norziana) [3] ; Rohmad, MS (Rohmad, Mohd Saufy) [4] |
| 20 | Rewarding Developers by Storing Applications on Non-Fungible Tokens | Kalhoro, A (Kalhoro, Ayesha) [1] ; Wagan, AA (Wagan, Asif Ali) [1] ; Khan, AA (Khan, Abdullah Ayub) [1] , [2] ; Lin, JM (Lin, Jim-Min) [3] ; Ku, CS (Ku, Chin Soon) [4] ; Por, LY (Por, Lip Yee) [5] ; Yang, J (Yang, Jing) [5] |
| 21 | OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification | Hameed, MM (Hameed, M. Muzaffar) [1] , [2] ; Ahmad, R (Ahmad, Rodina) [1] ; Kiah, LM (Kiah, Laiha Mat) [1] ; Murtaza, G (Murtaza, Ghulam) [3] ; Mazhar, N (Mazhar, Noman) [1] |
| 22 | Web content topic modeling using LDA and HTML tags | Altarturi, Hamza H. M.; Saadoon, Muntadher; Anuar, Nor Badrul |
| 23 | Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions | Ayedh, Aljuaid Turkea M.; Wahab, Ainuddin Wahid Abdul; Idris, Mohd Yamani Idna |
| 24 | Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges | Norman, Azah Anir; Marzuki, Athirah Husna; Faith, Fatokun; Hamid, Suraya; Ghani, Norjihan Abdul; Ravana, Sri Devi; Arshad, Noreen Izza |
| 25 | An Automated Precise Authentication of Vehicles for Enhancing the Visual Security Protocols | Roy, Kumarmangal; Ahmad, Muneer; Ghani, Norjihan Abdul; Uddin, Jia; Shin, Jungpil |
| 26 | Exploring Manet Security Aspects: Analysis Of Attacks And Node Misbehaviour Issues | Khan, Burhan Ul Islam; Anwar, Farhat; Rahman, Farah Diyana Bt. Abdul; Olanrewaju, Rashidah Funke; Kiah, Laiha B. Mat; Rahman, Md Arafatur; Janin, Zuriati |
| 27 | An Empirical Examination of Formation of Trust in Blockchain | Ali, V (Ali, Vizaad) [1] ; Norman, AA (Norman, Azah Anir) [1] ; Azzuhri, SRB (Azzuhri, Saaidal Razalli Bin) [2] |
| 28 | The rise of user profiling in social media: review, challenges and future direction | Gilbert, Justin; Hamid, Suraya; Hashem, Ibrahim Abaker Targio; Ghani, Norjihan Abdul; Boluwatife, Fatokun Faith |
| 29 | A Comprehensive Review of Cyberbullying-related Content Classification In Online Social Media | Teoh Hwai Teng, Kasturi Dewi Varathan, Fabio Crestani b |
| 30 | Scalability Improvement Of Active Probing For Failure Detection In Large-Scale Software Defined Networks Using Community Detection Algorithms | Sahran, F (Sahran, Firdaus) [1]; Anuar, NB (Anuar, Nor Badrul) [1] |