Evaluation of an Open Source Learning Management System: Claroline NB Awang, MYB Darus Procedia-Social and Behavioral Sciences 67, 416-426, 2012 | 53 | 2012 |
VANETS and Internet of Things (IoT): A discussion SM Hatim, SJ Elias, N Awang, MY Darus Indones. J. Electr. Eng. Comput. Sci 12 (1), 218-224, 2018 | 44 | 2018 |
Wireless Intruder Detection System (WIDS) In Detecting De-Authentication and Disassociation Attacks in IEEE 802.11 N Baharudin, FHM Ali, MY Darus, N Awang 2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015 | 21 | 2015 |
Data Leakage Detection in Cloud Computing Platform MAM Ariffin, KA Rahman, MY Darus, N Awang, Z Kasiran Int. J. Adv. Trends Comput. Sci. Eng 8 (1.3), S1, 2019 | 12 | 2019 |
Identification of Information Security Threats Using Data Mining Approach in Campus Network N Awang, GN Samy, NH Hassan, N Maarop, P Magalingam, ... Journal of Physics: Conference Series 1551 (1), 012006, 2020 | 10 | 2020 |
Mobile Self-Management System for University Students using Mobile Application Development Lifecycle (MADLC) MY Darus, MSA Hazani, N Awang Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 10 | 2017 |
A Review on Risk Assessment Using Risk Prediction Technique in Campus Network N Awang, A Xanthan, LN Samy, NH Hassan International Journalof Advanced Trends in Computer Science and Engineering …, 2020 | 7 | 2020 |
The evaluation of AdBlock technique implementation for enterprise network environment MIB Samsuddin, MY Darus, SJ Elias, AHM Taib, N Awang, R Din Indones. J. Electr. Eng. Comput. Sci 13 (3), 1102-1109, 2019 | 7 | 2019 |
Agent-Based Encryption for Password Management Application NHA Zukri, NAM Rashid, N Awang, ZA Zulkifli Charting the Sustainable Future of ASEAN in Science and Technology …, 2020 | 3 | 2020 |
Analysis performance on contention-based MAC protocols in MANETs MY Darus, A Kamarudin, N Awang, FHM Ali Institute of Electrical and Electronics Engineers Inc., 2015 | 3 | 2015 |
Prioritizing Cybersecurity Management Guidelines using Analytical Hierarchy Process (AHP) Decision Technique N Awang, GN Samy, NH Hassan Open International Journal of Informatics 10 (Special Issue 1), 1-10, 2022 | 2 | 2022 |
Implementation of SARIMA algorithm in understanding cybersecurity threats in university network N Awang, A Ganthan, LN Samy, NH Hassan, N Maarop, S Perumal Journal of Positive School Psychology 6 (3), 8442–8451-8442–8451, 2022 | 2 | 2022 |
An Improvement of Resource Consumption In Wireless Sensor Network (WSN) Using Compressive Sensing MA Ibrahim, N Awang Malaysian Journal of Computing (MJoC) 7 (1), 1036-1046, 2022 | 2 | 2022 |
Multi-agent integrated password management (MIPM) application secured with encryption N Awang, NHA Zukri, NAM Rashid, ZA Zulkifli, NAM Nazri AIP Conference Proceedings 1891 (1), 2017 | 2 | 2017 |
Manual Malware Analysis Using Static Method N AWANG, A SALLEH, MY DARUS International Journal of Computer Networks and Communications Security 1 (7 …, 2013 | 2* | 2013 |
A Multi Agent-Based Security Protocol for Securing Password Management Application NAM Rashid, NHA Zukri, ZA Zulkifli, N Awang, AG Buja 2020 10th IEEE International Conference on Control System, Computing and …, 2020 | 1 | 2020 |
Risk Assessment using Big Data Analytics Approach: A Review N Awang, GN Samy, N Maarop, P Magalingam, NH Hassan, DWH Ten Open International Journal of Informatics (OIJI), 1-12, 2018 | 1 | 2018 |
Secure Multi-Agent Integrated Password Management (MIPM) Application N Awang, NHA Zukri, NAM Rashid, ZA Zulkifli, NAN Adnan Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017 | 1 | 2017 |
Permission Based in Android Malware Classification Z KASIRAN, N AWANG, FN RUSLI DEStech Transactions on Engineering and Technology Research, 2017 | 1 | 2017 |
User Perceptions towards the Use of Colour as Authentication Method: Focus On FTMSK Lecturer MABM Isa, MNHH Jono, MY Darus, N Awang 2008 International Conference on Computer and Communication Engineering, 1-6, 2008 | 1 | 2008 |