Seguir
Hazinah k mammi
Hazinah k mammi
Lecturer of Computer Science, Universiti Teknologi Malaysia
Dirección de correo verificada de utm.my
Título
Citado por
Citado por
Año
Towards identifying usability and security features of graphical password in knowledge based authentication technique
MD Hafiz, AH Abdullah, N Ithnin, HK Mammi
2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008
1282008
Secured data storage framework for land registration using blockchain technology
S Humdullah, SH Othman, MN Razali, HK Mammi
2021 3rd international cyber resilience conference (crc), 1-6, 2021
152021
Competency-based education (CBE) for IT security: towards bridging the gap
HK Mammi, N Ithnin
Proceedings of IEEE International Conference on Teaching, Assessment, and …, 2012
122012
A study on image security in social media using digital watermarking with metadata
MAF bin Jeffry, HK Mammi
2017 IEEE conference on application, information and network security (AINS …, 2017
112017
An anti-shoulder surfing mechanism and its memorability test
LK Seng, N Ithnin, H Mammi
International Journal of Security and Its Applications 6 (5), 87-96, 2012
92012
User's Affinity of Choice: Features of Mobile Device Graphical Password Scheme's Anti-Shoulder Surfing Mechanism
LK Seng, N Ithnin, HK Mammi
International Journal of Computer Science Issues (IJCSI) 8 (4), 255, 2011
72011
Timetable scheduling system using genetic algorithm for school of computing (tsuGA)
HK Mammi, LY Ying
International Journal of Innovative Computing 11 (2), 67-72, 2021
42021
Cyber security awareness game (CSAG) for secondary school students
LW Shen, HK Mammi, MM Din
2021 International Conference on Data Science and Its Applications (ICoDSA …, 2021
42021
To share or not to share: Tabayyun made possible with MyVeri5
M Ghazali, SA Razak, M Salleh, HK Mammi, IF Isnin
Advanced Science Letters 23 (5), 4542-4545, 2017
42017
Identifying the Reusability of the Triangle and Intersection Schemes on Mobile Devices
LK Seng, N Ithnin, HK Mammi
Computer and Information Science 4 (4), 109, 2011
42011
Graphical password: User’s affinity of choice—an analysis of picture attributes selection
MDHB Abdullah, AHB Abdullah, N Ithnin, HK Mammi
2008 International Symposium on Information Technology 3, 1-6, 2008
42008
An improved blockchain technique for secure land registration data records
S Humdullah, SH Othman, MN Razali, HK Mammi, R Javed
International Journal of Innovative Computing 11 (2), 89-94, 2021
32021
Evaluation of business continuity plan maturity level using business continuity maturity model
H Haidzir, SH Othman, HK Mammi
International Journal of Innovative Computing 8 (1), 2018
32018
Lightweight symmetric encryption algorithm in big data
M Bakhtiari, A Zainal, S Bakhtiari, HK Mammi
Int. J. Advance Soft Compu. Appl 7 (3), 2015
32015
A Development of Headwater Phenomenon Warning and Monitoring System
MAM Kameel, IF Isnin, RZRM Radzi, MS Abd Latiff, KA Bakar, HK Mammi, ...
2020 IEEE 5th International Symposium on Telecommunication Technologies …, 2020
12020
Study on the effectiveness of securing instant messaging using one time pad
A Arifin, HK Mammi
Int. J. Adv. Soft Comput. Appl 6 (1), 2014
12014
Sistem Pengurusan Sijil Halal Menggunakan RFID
N Utheyakumar
Universiti Teknologi Malaysia, 2009
12009
Sistem Kawalan Inventori Makmal Komputer Menggunakan RFID
MF ABDULLAH
Universiti Teknologi Malaysia, 2008
12008
Sistem Pengurusan PSM II Jabatan SKK Secara Atas Talian
R MAT ADAM
Universiti Teknologi Malaysia, 2008
12008
Sistem Temujanji Bersama Doktor Berasaskan Aplikasi Web Dan Perkhidmatan Pesanan Ringkas (SMS)
MK JEDRIS
Universiti Teknologi Malaysia, 2007
12007
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20