Centre of Research for Cyber Security & Network (CSNET)

List of Publication

Bil Title Corresponding Authors
1 A bibliometric and content analysis of technological advancement applications in agricultural e-commerce Altarturi, HHM (Altarturi, Hamza H. M.) [1] ; Nor, ARM (Nor, Adibi Rahiman Md) [2] ; Jaafar, NI (Jaafar, Noor Ismawati) [3] ; Anuar, NB (Anuar, Nor Badrul) [1]
2 Exploring Social Media and Organisational Sustainability Performance Goals: Themes, Functional Areas, and Practices Learning from the Preceding Decade Alsehani, Fayez Nahedh; Wahab, Ainuddin Wahid Bin Abdul; Shuib, Liyana
3 Mobile Phone Data: A Survey of Techniques, Features, and Applications Okmi, M (Okmi, Mohammed) [1] , [2] ; Por, LY (Por, Lip Yee) [1] ; Ang, TF (Ang, Tan Fong) [1] ; Ku, CS (Ku, Chin Soon) [3]
4 Utilization Of Mobile Augmented Reality In A Course Content: An Impact Study AL-Amri, Saud; Hamid, Suraya; Noor, Nurul Fazmidar Mohd; Gani, Abdullah
5 Characteristics of Blockchain and Its Relationship With Trust Ali, V (Ali, Vizaad) [1] ; Norman, AA (Norman, Azah Anir) [1] ; Azzuhri, SRB (Azzuhri, Saaidal Razalli Bin) [2]
6 Secure PIN-Entry Method Using One-Time PIN (OTP) Binbeshr, F (Binbeshr, Farid) [1] , [2] ; Por, LY (Por, Lip Yee) [1] ; Kiah, MLM (Kiah, M. L. Mat) [1] ; Zaidan, AA (Zaidan, A. A.) [3] ; Imam, M (Imam, Muhammad) [4]
7 Factors influencing the elderly's behavioural intention to use smart home technologies in Saudi Arabia Maswadi, K (Maswadi, Kholoud) [1] , [2] ; Ghani, NA (Ghani, Norjihan Abdul) [1] ; Hamid, S (Hamid, Suraya) [1]
8 Emerging Technology for Healthy Lifestyle of the Middle-Age and Elderly: A Scoping Review Hamid, S (Hamid, Suraya) [1] ; Faith, F (Faith, Fatokun) [1] ; Jaafar, Z (Jaafar, Zulkarnain) [2] ; Ghani, NA (Ghani, Norjihan Abdul) [1] ; Yusop, FD (Yusop, Farrah Dina) [3]
9 Employees' BYOD Security Policy Compliance in the Public Sector Palanisamy, Rathika; Norman, Azah Anir; Kiah, Miss Laiha Mat
10 Skin lesion classification using multi-resolution empirical mode decomposition and local binary pattern Samsudin, Siti Salbiah; Arof, Hamzah; Harun, Sulaiman Wadi; Wahab, Ainuddin Wahid Abdul; Idris, Mohd Yamani Idna
11 The rise of website fingerprinting on Tor: Analysis on techniques and assumptions Zaki, F; Anuar, NB;
12 A Systematic Review of Mobile Phone Data in Crime Applications: A Coherent Taxonomy Based on Data Types and Analysis Perspectives, Challenges, and Future Research Directions Zaki, F; Anuar, NB;
13 Data plane failure and its recovery techniques in SDN: A systematic literature review han, N (Khan, Nauman) [1] , [2] ; bin Salleh, R (bin Salleh, Rosli) [1] ; Koubaa, A (Koubaa, Anis) [3] ; Khan, Z (Khan, Zahid) [3] ; Khan, MK (Khan, Muhammad Khurram) [4] ; Ali, I (Ali, Ihsan) [1]
14 RPLAD3: anomaly detection of blackhole, grayhole, and selective forwarding attacks in wireless sensor network-based Internet of Things han, N (Khan, Nauman) [1] , [2] ; bin Salleh, R (bin Salleh, Rosli) [1] ; Koubaa, A (Koubaa, Anis) [3] ; Khan, Z (Khan, Zahid) [3] ; Khan, MK (Khan, Muhammad Khurram) [4] ; Ali, I (Ali, Ihsan) [1]
15 Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption Alexan, Wassim; Chen, Yen-Lin; Por, Lip Yee; Gabr, Mohamed
16 A Review of Smart Contract Blockchain Based on Multi-Criteria Analysis: Challenges and Motivations Alshahrani, NM; Kiah, MLM; Saif, A
17 A Systematic Literature Review of Information Security in Chatbots Yang, Jing; Chen, Yen-Lin; Por, Lip Yee; Ku, Chin Soon
18 Enhanced Adaptable and Distributed Access Control Decision Making Model Based on Machine Learning for Policy Conflict Resolution in BYOD Environment Ayedh, MAT (Ayedh, M. Aljuaid Turkea); Wahab, AWA (Wahab, Ainuddin Wahid Abdul); Idris, MYI (Idris, Mohd Yamani Idna)
19 Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection Jimale, MA (Jimale, Mohamud Ahmed) [1] ; Abdullah, NA (Abdullah, Nor Aniza) [1] ; Kiah, MLBM (Kiah, Miss Laiha Binti Mat) [1] ; Idris, MYI (Idris, Mohd Yamani Idna) [1] ; Z'Aba, MR (Z'Aba, Muhammad Reza) [2] ; Jamil, N (Jamil, Norziana) [3] ; Rohmad, MS (Rohmad, Mohd Saufy) [4]
20 Rewarding Developers by Storing Applications on Non-Fungible Tokens Kalhoro, A (Kalhoro, Ayesha) [1] ; Wagan, AA (Wagan, Asif Ali) [1] ; Khan, AA (Khan, Abdullah Ayub) [1] , [2] ; Lin, JM (Lin, Jim-Min) [3] ; Ku, CS (Ku, Chin Soon) [4] ; Por, LY (Por, Lip Yee) [5] ; Yang, J (Yang, Jing) [5]
21 OffSig-SinGAN: A Deep Learning-Based Image Augmentation Model for Offline Signature Verification Hameed, MM (Hameed, M. Muzaffar) [1] , [2] ; Ahmad, R (Ahmad, Rodina) [1] ; Kiah, LM (Kiah, Laiha Mat) [1] ; Murtaza, G (Murtaza, Ghulam) [3] ; Mazhar, N (Mazhar, Noman) [1]
22 Web content topic modeling using LDA and HTML tags Altarturi, Hamza H. M.; Saadoon, Muntadher; Anuar, Nor Badrul
23 Systematic Literature Review on Security Access Control Policies and Techniques Based on Privacy Requirements in a BYOD Environment: State of the Art and Future Directions Ayedh, Aljuaid Turkea M.; Wahab, Ainuddin Wahid Abdul; Idris, Mohd Yamani Idna
24 Technology Dependency and Impact During COVID-19: A Systematic Literature Review and Open Challenges Norman, Azah Anir; Marzuki, Athirah Husna; Faith, Fatokun; Hamid, Suraya; Ghani, Norjihan Abdul; Ravana, Sri Devi; Arshad, Noreen Izza
25 An Automated Precise Authentication of Vehicles for Enhancing the Visual Security Protocols Roy, Kumarmangal; Ahmad, Muneer; Ghani, Norjihan Abdul; Uddin, Jia; Shin, Jungpil
26 Exploring Manet Security Aspects: Analysis Of Attacks And Node Misbehaviour Issues Khan, Burhan Ul Islam; Anwar, Farhat; Rahman, Farah Diyana Bt. Abdul; Olanrewaju, Rashidah Funke; Kiah, Laiha B. Mat; Rahman, Md Arafatur; Janin, Zuriati
27 An Empirical Examination of Formation of Trust in Blockchain Ali, V (Ali, Vizaad) [1] ; Norman, AA (Norman, Azah Anir) [1] ; Azzuhri, SRB (Azzuhri, Saaidal Razalli Bin) [2]
28 The rise of user profiling in social media: review, challenges and future direction Gilbert, Justin; Hamid, Suraya; Hashem, Ibrahim Abaker Targio; Ghani, Norjihan Abdul; Boluwatife, Fatokun Faith
29 A Comprehensive Review of Cyberbullying-related Content Classification In Online Social Media Teoh Hwai Teng, Kasturi Dewi Varathan, Fabio Crestani b
30 Scalability Improvement Of Active Probing For Failure Detection In Large-Scale Software Defined Networks Using Community Detection Algorithms Sahran, F (Sahran, Firdaus) [1]; Anuar, NB (Anuar, Nor Badrul) [1]