Items where Division is "Faculty of Information and Communication Technology > Department of System and Computer Communication" and Year is 2012
Up a level |
A
A,H, Azni and Rabiah , Ahmad and Hasan Basari, Abd Samad and Hussin , Burairah (2012) Correlated Node Behavior Model based on Semi Markov Process for MANETS. International Journal of Computer Science Issues . pp. 50-59. ISSN 1694-0814
Abdul Latip, Shekh Faisal (2012) Fault Analysis of the KATAN Family of Block Ciphers. In: Information Security Practice and Experience 2012 (ISPEC 2012), 9 - 12 April 2012, Hangzhou, China.
Ahmad , Rabiah (2012) Perception on Cyber Terrorism: A Focus Group Discussion Approach. Journal of Information Security, 2012, 3. pp. 231-237. ISSN 2153-1234
B
Bahaman, Nazrulazhar and Abdollah, Mohd Faizal and Mas'ud, Mohd Zaki and Anton Satria, Prabuwono (2012) Effectiveness of security tools to anomalies on tunneled traffic. Information Technology Journal, 11 (2). pp. 191-199. ISSN 1812-5638
Bahaman, Nazrulazhar and Anton Satria, Prabuwono and Mas'ud, Mohd Zaki and Abdollah, Mohd Faizal (2012) Effectiveness of security tools to anomalies on tunneled traffic. Information Technology Journal, 11 (2). pp. 191-199. ISSN 1812-5638
Bahaman, Nazrulazhar and Hamid, Erman and Prabuwono, Anton Satria (2012) Network performance evaluation of 6to4 tunneling. In: International Conference on Innovation Management and Technology Research, 21-22 May 2012, Malacca, Malaysia.
Bahaman, Nazrulazhar and Prabuwono, Anton Satria and AlSaqour, Read and Mas'ud, Mohd Zaki (2012) Network performance evaluation of tunneling mechanism. Journal of Applied Sciences, 12 (5). pp. 459-465. ISSN 1812-5654
Bahaman, Nazrulazhar and Prabuwono, Anton Satria and Mas'ud, Mohd Zaki and Abdollah, Mohd Faizal (2012) Effectiveness of security tools to anomalies on tunneled traffic. Information Technology Journal, 11 (2). pp. 191-199. ISSN 1812-5638 (Submitted)
I
Ismail, Nurul Halimatul Asmak and Hassan, Rosilah and Wan Mohd Ghazali, Khadijah (2012) A Study On Protocol Stack In 6lowpan Model. Journal of Theoretical and Applied Information Technology, 41 (2). pp. 220-229. ISSN 1992-8645
M
M., Zulkiflee and Yusof, Robiah and Abu, Nur Azman and Sahib, Shahrin (2012) Improvising intrusion detection for malware activities on dual-stack network environment. International Conference on Information Systems, Management and Evaluation (ICISME 2012), 6. pp. 537-542. ISSN -
M.P. Azuwa, Azuwa and Ahmad, Rabiah and Sahib, Sharin (2012) Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard. International Journal of Cyber-Security and Digital Forensics, 1. pp. 280-288. ISSN 23050012
M.P. Azuwa, Azuwa and Ahmad, Rabiah and Sahib, Shahrin and Shamsuddin, Solahuddin (2012) Technical Security Metrics Model in Compliance with ISO/IEC 27001 Standard. The Society of Digital Information and Wireless Communication. ISSN 2305-0012
Md Shah, Wahidah (2012) Localising Peers in P2P Live Streaming Systems Within Resource-Constrained Networks. In: INTERNATIONAL CONFERENCE ON COMPUTER & INFORMATION SCIENCES, 12 - 14 JUNE 2012, KUALA LUMPUR CONVENTION CENTRE.
Mohd, Othman * and Nanna , Suryanna and Sahib@Sahibuddin, Shahrin and Abdollah, Mohd Faizal and Selamat, Siti Rahayu (2012) Thresholding and Fuzzy Rule-Based Classification Approaches in Handling Mangrove Forest Mixed Pixel Problems Associated with in QuickBird Remote Sensing Image Analysis. International Journal of Agriculture and Forestry, 2 (6). pp. 300-306. ISSN 2165-882X
Muslim, Z. and Yusof, R. and Abu, N. A. and Sahib, S. (2012) Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment. In: WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY , July 2012, Stockholm, Sweden.
R
Rabiah, Ahmad and Zahari, Yunos and Shahrin, Sahib and Mariana, Yusoff (2012) Perception on Cyber Terrorism: A Focus Group Discussion Approach. Journal of Information Security, 2012. pp. 231-237. ISSN 2153-1234
Rabiah, Ahmad and Zul Azri, Muhamad Noh and Abd. Samad, Hasan Basari and Burairah, Hussin (2012) Correlated Node Behavior Model based on Semi Markov Process for MANETS. International Journal of Computer Science Issues , 9 (1). pp. 50-59. ISSN 1694-0814
Rabiah, Ahmad and Zahari, Yunos (2012) A Dynamic Cyber Terrorism Framework. International Journal of Computer Science and Information Security, 10. pp. 149-158. ISSN 19475500
Rahmalan, Hidayah and Abdollah, Mohd Faizal and Mohd Kosnin, Zarita and Christy Atika Sari and Eko Hari Rachmawanto (2012) Analysis of optimization medical image watermarking using particle swarm optimization based on SLT. In: Fourth International Conference of Soft Computing and Pattern Recognition , 10-13 Dec 2012, Brunei.
S
Suryana, Nanna and Akbar, Habibullah and Sahib, Shahrin and Pramudya Ananta, Gede and Basiron, Halizah (2012) Reflection decomposition in single images using an optimum thresholding-based method. Journal of Advanced Computer Science and Technology Research, 2 (4). pp. 184-192. ISSN 2231-8275
Y
Yusof, R. (2012) Faedah Pengambilan Air Kosong. Buletin FTMK. pp. 32-33. ISSN 2229-9351
Yusof, R. (2012) What Hacking is all about. Buletin FTMK. pp. 24-25. ISSN 2229-9351