Follow
Norkhushaini Awang
Title
Cited by
Cited by
Year
Evaluation of an open source learning management system: Claroline
NB Awang, MYB Darus
Procedia-Social and Behavioral Sciences 67, 416-426, 2012
382012
VANETS and Internet of Things (IoT): A discussion
SM Hatim, SJ Elias, N Awang, MY Darus
Indonesian Journal of Electrical Engineering and Computer Science 12 (1 …, 2018
212018
Wireless intruder detection system (wids) in detecting de-authentication and disassociation attacks in ieee 802.11
N Baharudin, FHM Ali, MY Darus, N Awang
2015 5th International Conference on IT Convergence and Security (ICITCS), 1-5, 2015
122015
Mobile Self-Management System for University Students using Mobile Application Development Lifecycle (MADLC)
MY Darus, MSA Hazani, N Awang
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
62017
A review on risk assessment using risk prediction technique in campus network
N Awang, A Xanthan, LN Samy, NH Hassan
International Journalof Advanced Trends in Computer Science and Engineering …, 2020
32020
Analysis performance on contention-based MAC protocols in MANETs
MY Darus, A Kamarudin, N Awang, FHM Ali
2014 4th World Congress on Information and Communication Technologies (WICT …, 2014
32014
Identification of information security threats using data mining approach in campus network
N Awang, GN Samy, NH Hassan, N Maarop, P Magalingam, ...
Journal of Physics: Conference Series 1551 (1), 012006, 2020
22020
Agent-Based Encryption for Password Management Application
NHA Zukri, NAM Rashid, N Awang, ZA Zulkifli
Charting the Sustainable Future of ASEAN in Science and Technology, 529-541, 2020
22020
Data leakage detection in cloud computing platform
MAM Ariffin, KA Rahman, MY Darus, N Awang, Z Kasiran
Int. J. Adv. Trends Comput. Sci. Eng 8 (1.3), S1, 2019
22019
User perceptions towards the use of colour as authentication method: Focus on FTMSK lecturer
MABM Isa, MNHH Jono, MY Darus, N Awang
2008 International Conference on Computer and Communication Engineering, 1-6, 2008
22008
Risk Assessment using Big Data Analytics Approach: A Review
N Awang, GN Samy, N Maarop, P Magalingam, NH Hassan, DWH Ten
Open International Journal of Informatics (OIJI), 1-12, 2018
12018
Multi-agent integrated password management (MIPM) application secured with encryption
N Awang, NHA Zukri, NAM Rashid, ZA Zulkifli, NAM Nazri
AIP Conference Proceedings 1891 (1), 020031, 2017
12017
Secure Multi-Agent Integrated Password Management (MIPM) Application
N Awang, NHA Zukri, NAM Rashid, ZA Zulkifli, NAN Adnan
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
12017
Manual Malware Analysis Using Static Method
N AWANG, A SALLEH, MY DARUS
International Journal of Computer Networks and Communications Security 1 (7 …, 2013
12013
Prioritizing Cybersecurity Management Guidelines using Analytical Hierarchy Process (AHP) Decision Technique
N Awang, GN Samy, NH Hassan
Open International Journal of Informatics 10 (Special Issue 1), 1-10, 2022
2022
Implementation of SARIMA Algorithm in Understanding Cybersecurity Threats in University Network
N Awang, A Ganthan, LN Samy, NH Hassan, N Maarop, S Perumal
Journal of Positive School Psychology 6 (3), 8442–8451-8442–8451, 2022
2022
An improvement of resource consumption in wireless sensor network (WSN) using compressive sensing
MA Ibrahim, N Awang
Malaysian Journal of Computing (MJoC) 7 (1), 1036-1046, 2022
2022
Effect of Spindle Speed and Feed Per Tooth in Feed Rate Perspective on Inconel HX Cutting Force
NAM Nor, NF Kamarulzaman, NAS Zakaria, N Awang, B Baharudin, ...
Journal of Mechanical Engineering (JMechE) 18 (2), 65-76, 2021
2021
A Multi Agent-Based Security Protocol for Securing Password Management Application
NAM Rashid, NHA Zukri, ZA Zulkifli, N Awang, AG Buja
2020 10th IEEE International Conference on Control System, Computing and …, 2020
2020
Mobile Malware Classification
Z Kasiran, N Awang, FN Rusli
International Journal of Engineering & Technology 7 (4.31), 209-213, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–20