Search Results - 36682671900
- Showing 1 - 20 results of 113
- Go to Next Page
-
1
Improved S-box construction from binomial power functions by Isa H., Jamil N., Z'aba M.R.
Published 2023Conference Paper -
2
The CiliPadi Family of Lightweight Authenticated Encryption, v1.2 by Z'aba M.R., Jamil N., Rohmad M.S., Rani H.A., Shamsuddin S.
Published 2023Article -
3
Security issues of ad-hoc network of sensor node in disaster mitigation plan by Sameon S.S., Jamil N.
Published 2023Article -
4
S-box optimisation using heuristic methods by Isa H., Jamil N., Z'Aba M.R.
Published 2023Conference Paper -
5
Indoor positioning: Technology comparison analysis by Din M.M., Jamil N., Maniam J., Mohamed M.A.
Published 2023Article -
6
Blockchain-based smart energy trading: Motivations and challenges by Amini A., Jamil N., Bohani F.A.
Published 2023Article -
7
Construction of Cryptographically Strong S-Boxes Inspired by Bee Waggle Dance by Isa H., Jamil N., Z�aba M.R.
Published 2023Article -
8
-
9
Review of indoor localization techniques by Din M.M., Jamil N., Maniam J., Mohamed M.A.
Published 2023Article -
10
An improved indoor location technique using Kalman Filter by Fariz N., Jamil N., Din M.M., Rusli M.E., Sharudin Z., Mohamed M.A.
Published 2023Article -
11
A Quick Review of Security Issues in Telemedicine by Razali R.A., Jamil N.
Published 2023Conference Paper -
12
INSIDER THREATS: PROFILING POTENTIAL MALICIOUS ATTACKS, SEVERITY AND IMPACT by Ibrahim Z.-A., Rahim F.A., Alauddin A.A., Jamil N., Abdullah H.I.M.
Published 2023Article -
13
Implementation of lightweight cryptographic primitives by Hammad B.T., Jamil N., Rusli M.E., Z�Aba M.R., Ahmed I.T.
Published 2023Article -
14
Implementation of lightweight cryptographic primitives by Hammad B.T., Jamil N., Rusli M.E., Z�Aba M.R., Ahmed I.T.
Published 2023Article -
15
Faster multicollisions attack on sponge construction by Hammad B.T., Jamil N., Zaba M.R., Rusli M.E., Ahmed I.T.
Published 2023Article -
16
Digital dissemination of information about mosque activities to communities by Asri N.A., Mohamed M.A., Mamat A.R., Mohamad Z., Amin M.A.M., Nor M.A.M., Jamil N.
Published 2023Article -
17
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system by Qassim Q.S., Jamil N., Daud M., Ja'affar N., Yussof S., Ismail R., Kamarulzaman W.A.W.
Published 2023Article -
18
IoT honeypot: A review from researcher's perspective by Razali M.F., Muruti G., Razali M.N., Jamil N., Mansor F.Z.
Published 2023Conference Paper -
19
-
20
Cybersecurity of microgrid: State-of-the-art review and possible directions of future research by Jamil N., Qassim Q.S., Bohani F.A., Mansor M., Ramachandaramurthy V.K.
Published 2023Other Authors: “…36682671900…”
Review
