Leau Yu Beng
Leau Yu Beng
Senior Lecturer, Faculty of Computing and Informatics; Head of Cybersecurity Research Group
Verified email at
Cited by
Cited by
Software development life cycle AGILE vs traditional approaches
YB Leau, WK Loo, WY Tham, SF Tan
International Conference on Information and Network Technology 37 (1), 162-167, 2012
Impact of coronavirus pandemic crisis on technologies and cloud computing applications
ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a
Journal of Electronic Science and Technology 19 (1), 100059, 2021
A lightweight and private mobile payment protocol by using mobile network operator
TS Fun, LY Beng, J Likoh, R Roslan
2008 International Conference on Computer and Communication Engineering, 162-166, 2008
Network security situation prediction: a review and discussion
YB Leau, S Manickam
International Conference on Soft Computing, Intelligence Systems, and …, 2015
Privacy in new mobile payment protocol
TS Fun, LY Beng, R Roslan, HS Habeeb
International Journal of Computer and Information Engineering 2 (11), 3713-3717, 2008
Implementation of constraint programming and simulated annealing for examination timetabling problem
TL June, JH Obit, YB Leau, J Bolongkikit
Computational science and technology, 175-184, 2019
Security issues on banking systems
MKA Ahmad, RV Rosalim, LY Beng, TS Fun
International Journal of Computer Science and Information Technologies 1 (4 …, 2010
A survey of intrusion alert correlation and its design considerations
L Yu Beng, S Ramadass, S Manickam, T Soo Fun
IETE Technical Review 31 (3), 233-240, 2014
Review of mobile macro-payments schemes
TS Fun, LY Beng, MN Razali
Journal of Advances in Computer Networks 1 (4), 323-327, 2013
Detection and defense mechanisms on duplicate address detection process in IPv6 link-local network: A survey on limitations and requirements
AK Al-Ani, M Anbar, S Manickam, CY Wey, YB Leau, A Al-Ani
Arabian Journal for Science and Engineering 44 (4), 3745-3763, 2019
A novel adaptive grey verhulst model for network security situation prediction
YB Leau, S Manickam
International Journal of Advanced Computer Science and Applications 7 (1), 2016
Network security situation assessment: a review and discussion
YB Leau, S Manickam, YW Chong
Information Science and Applications, 407-414, 2015
Adaptive path finding algorithm in dynamic environment for warehouse robot
MK Ng, YW Chong, K Ko, YH Park, YB Leau
Neural Computing and Applications 32 (17), 13155-13171, 2020
Security issues on identity card in Malaysia
YA Kee, YC Nee, LY Beng, TS Fun
International Journal of Engineering and Technology 4 (5), 617, 2012
A comparative study of alert correlations for intrusion detection
LY Beng, S Ramadass, S Manickam, TS Fun
2013 International Conference on Advanced Computer Science Applications and …, 2013
Proposed DAD-match security technique based on hash function to secure duplicate address detection in IPv6 link-local network
AK Al-Ani, M Anbar, S Manickam, A Al-Ani, YB Leau
Proceedings of the 2017 International Conference on Information Technology …, 2017
Students’ and teachers’ perception towards an interactive courseware for history subject: a case study in Labuan Secondary Schools
A Yoag, CS Na, LY Beng, M Japang
J Educ Technol 12 (3), 5-13, 2012
ROM-P: Route optimization management of producer mobility in information-centric networking
L Xian Wee, Z Yan, YJ Park, YB Leau, K Nisar, AA Ag Ibrahim
First International Conference on Intelligent Transport Systems, 81-91, 2018
Proposed DAD-match mechanism for securing duplicate address detection process in IPv6 link-local network based on symmetric-key algorithm
AK Al-Ani, M Anbar, S Manickam, A Al-Ani, YB Leau
International Conference on Computational Science and Technology, 108-118, 2017
Managing legal, consumers and commerce risks in phishing
NMN Dinna, YB Leau, SAH Habeeb, AS Yanti
International Journal of Human and Social Sciences 3 (5), 2008
The system can't perform the operation now. Try again later.
Articles 1–20