Items where Division is "Faculty of Information and Communication Technology > Department of System and Computer Communication" and Year is 2013

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Number of items: 15.

Abdelrafe, E. and Hussin, B. (2013) Managing Software Project Risks (Implementation Phase) With Proposed Regression Analysis Techniques. International Journal On Information Technology (I.R.E.I.T) , Vol.1 (5). pp. 278-312. ISSN 2281-2911 (Submitted)

Abdelrafe , Elzamly and Burairah, Hussin (2013) Managing Software Project Risks (Design Phase) with Proposed Fuzzy Regression Analysis Techniques With Fuzzy Concepts. International Review On Computers And Software (I.RE.COS), Vol. 8 (N. 11). pp. 2601-2613. ISSN 1828-6003 (Submitted)

Abdullah, Raihana Syahirah and Abdollah, Mohd Faizal and Muhamad Noh, Zul Azri and Mas'ud, Mohd Zaki and Selamat, Siti Rahayu and Yusof, Robiah (2013) Revealing The Criterion On Botnets Detection Technique. International Journal of Computer Science Issues , 10 (2). pp. 208-215. ISSN 1694-0814

Abu, Nur Azman and Ernawan, Ferda and Herman, Nanna Suryana (2013) An image dithering via Tchebichef moment transform. Journal of Computer Science, 9 (7). pp. 811-820. ISSN 1549-3636

Abu, Nur Azman and Ferda, Ernawan and Nanna Suryana, Herman (2013) A Generic Psychovisual Error Threshold for the Quantization Table Generation on JPEG Image Compression. In: IEEE 9th International Colloquium on Signal Processing and its Applications, , 8-10 March 2013, Kuala Lumpur.

Abu, Nur Azman and Ferda, Ernawan and Shahrin, Sahib (2013) A Psychovisual Model based on Discrete Orthonormal Transform. In: International Conference on Mathematical Sciences and Statistics 2013 , 5-7 Febuary 2013, Kuala Lumpur.

Abu, Nur Azman and Ferda , Ernawan and Hermman, NannaSuryana and Sahib, Shahrin (2013) Image Watermarking Using Psychovisual Threshold Over the Edge. In: Asian Conference on Availability, Reliability and Security (AsiaARES 2013), 25-29 March 2013, Yogyakarta.

Bahaman, Nazrulazhar and Anton Satria, Prabuwono and Teddy , Mantoro (2013) Reconnaissance attack on IPv6 to IPv4 tunneling. In: International Journal of Mobile Computing and Multimedia Communication. IGI Publishing, USA, pp. 1-9. ISBN 978-1-4666-3085-7

Nahar, Haniza and Sahib, Shahrin and Muslim, Zulkiflee and Ayop, Zakiah (2013) Network Model Diversity For Wireless Studies. International Journal Of Information And Communication Technology Research, 3 (1). pp. 7-11. ISSN 2223-4985

Palaniapan , Shamala and Rabiah, Ahmad and Mariana, Yusoff (2013) A conceptual framework of info structure for information security risk assessment (ISRA. Journal of Information security and applications. pp. 45-52. ISSN 22142216

Raihana Syahirah Abdullah, RS Abdullah and Mohd Faizal Abdollah, Faizal M.A. and Zul Azri Muhamad Noh, ZAM Noh (2013) Analysis and Improvement Design on P2P Botnets Detection Framework. International Review on Computers and Software (IRECOS) . pp. 2859-2867. ISSN 1828-6003

Raihana Syahirah Abdullah, Raihana S.A. and Faizal M.A., Faizal M.A. and Zul Azri Muhamad Noh, ZAM Noh (2013) New Discovery of P2P Botnets Attack Pattern within Host-and-Network Atmosphere. International Review on Computers and Software (I.RE.CO.S.). pp. 2663-2670. ISSN 18286003

Saaya, Zurina and Schaal, Markus and Rafter, Rachael and Smyth, Barry (2013) Recommending Topics for Web Curation. In: User Modeling, Adaptation, and Personalization, 10-14 june 2014, Rome, Italy.

Selamat, S. R. and Sahib, S. and Hassan, N. H. and Yusof, R. and Abdollah, M. F. (2013) Forensic Traceability Index in Digital Forensic Investigation. Journal of Information Security. pp. 19-32. ISSN 2153-1234

Wan Mohd Ghazali, Khadijah and Hassan, Rosilah and Md. Ali, Zulkarnain (2013) A Network Device Simulator in Android Platform. In: The 15th International Conference on Advanced Communications Technology (ICACT2013), 27 - 30 January 2013, Phoenix Park, South Korea.

This list was generated on Mon Dec 23 13:38:31 2024 +08.