Follow
Norkhushaini Awang
Norkhushaini Awang
Verified email at tmsk.uitm.edu.my
Title
Cited by
Cited by
Year
Evaluation of an Open Source Learning Management System: Claroline
NB Awang, MYB Darus
Procedia-Social and Behavioral Sciences 67, 416-426, 2012
522012
VANETS and Internet of Things (IoT): A discussion
SM Hatim, SJ Elias, N Awang, MY Darus
Indones. J. Electr. Eng. Comput. Sci 12 (1), 218-224, 2018
432018
Wireless Intruder Detection System (WIDS) In Detecting De-Authentication and Disassociation Attacks in IEEE 802.11
N Baharudin, FHM Ali, MY Darus, N Awang
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
202015
Data Leakage Detection in Cloud Computing Platform
MAM Ariffin, KA Rahman, MY Darus, N Awang, Z Kasiran
Int. J. Adv. Trends Comput. Sci. Eng 8 (1.3), S1, 2019
122019
Identification of Information Security Threats Using Data Mining Approach in Campus Network
N Awang, GN Samy, NH Hassan, N Maarop, P Magalingam, ...
Journal of Physics: Conference Series 1551 (1), 012006, 2020
102020
Mobile Self-Management System for University Students using Mobile Application Development Lifecycle (MADLC)
MY Darus, MSA Hazani, N Awang
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
102017
A Review on Risk Assessment Using Risk Prediction Technique in Campus Network
N Awang, A Xanthan, LN Samy, NH Hassan
International Journalof Advanced Trends in Computer Science and Engineering …, 2020
72020
The evaluation of AdBlock technique implementation for enterprise network environment
MIB Samsuddin, MY Darus, SJ Elias, AHM Taib, N Awang, R Din
Indones. J. Electr. Eng. Comput. Sci 13 (3), 1102-1109, 2019
72019
Agent-Based Encryption for Password Management Application
NHA Zukri, NAM Rashid, N Awang, ZA Zulkifli
Charting the Sustainable Future of ASEAN in Science and Technology …, 2020
32020
Analysis performance on contention-based MAC protocols in MANETs
MY Darus, A Kamarudin, N Awang, FHM Ali
Institute of Electrical and Electronics Engineers Inc., 2015
32015
Prioritizing Cybersecurity Management Guidelines using Analytical Hierarchy Process (AHP) Decision Technique
N Awang, GN Samy, NH Hassan
Open International Journal of Informatics 10 (Special Issue 1), 1-10, 2022
22022
Implementation of SARIMA algorithm in understanding cybersecurity threats in university network
N Awang, A Ganthan, LN Samy, NH Hassan, N Maarop, S Perumal
Journal of Positive School Psychology 6 (3), 8442–8451-8442–8451, 2022
22022
An Improvement of Resource Consumption In Wireless Sensor Network (WSN) Using Compressive Sensing
MA Ibrahim, N Awang
Malaysian Journal of Computing (MJoC) 7 (1), 1036-1046, 2022
22022
Multi-agent integrated password management (MIPM) application secured with encryption
N Awang, NHA Zukri, NAM Rashid, ZA Zulkifli, NAM Nazri
AIP Conference Proceedings 1891 (1), 2017
22017
Manual Malware Analysis Using Static Method
N AWANG, A SALLEH, MY DARUS
International Journal of Computer Networks and Communications Security 1 (7 …, 2013
2*2013
A Multi Agent-Based Security Protocol for Securing Password Management Application
NAM Rashid, NHA Zukri, ZA Zulkifli, N Awang, AG Buja
2020 10th IEEE International Conference on Control System, Computing and …, 2020
12020
Risk Assessment using Big Data Analytics Approach: A Review
N Awang, GN Samy, N Maarop, P Magalingam, NH Hassan, DWH Ten
Open International Journal of Informatics (OIJI), 1-12, 2018
12018
Secure Multi-Agent Integrated Password Management (MIPM) Application
N Awang, NHA Zukri, NAM Rashid, ZA Zulkifli, NAN Adnan
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
12017
Permission Based in Android Malware Classification
Z KASIRAN, N AWANG, FN RUSLI
DEStech Transactions on Engineering and Technology Research, 2017
12017
User Perceptions towards the Use of Colour as Authentication Method: Focus On FTMSK Lecturer
MABM Isa, MNHH Jono, MY Darus, N Awang
2008 International Conference on Computer and Communication Engineering, 1-6, 2008
12008
The system can't perform the operation now. Try again later.
Articles 1–20