Showing 1 - 20 results of 119 for search 'Maarof, Mohd. Aizaini', query time: 0.07s
Refine Results
-
1
Teknologi maklumat siri 1: sistem komputer dan perisian by Maarof, Mohd. Aizaini
Published 2004
Book -
2
-
3
-
4
Secret sharing scheme for collaborative access system by Kadir, Rashidah, Maarof, Mohd. Aizaini
Published 2000
Conference or Workshop Item -
5
A Comparative statistical analysis of pseudorandom bit sequences by Kadir, Rashidah, Maarof, Mohd. Aizaini
Published 2009Conference or Workshop Item -
6
Potential issues in novel computational research: artificial immune systems by Iqbal, Anjum, Maarof, Mohd. Aizaini
Published 2003
Conference or Workshop Item -
7
Design of extended Feistel Network -maximum distance separable structure by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2008Book Section -
8
Diffusion analysis of EFN-MDS structure by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006
Conference or Workshop Item -
9
Hybrid algorithm (GACSA) for the cryptanalysis of a simple substitution cipher by Maarof, Mohd. Aizaini, Ahmad, Badrisham
Published 2007Conference or Workshop Item -
10
Network coding efficiency in live video streaming over Peer-to-Peer Mesh networks by Barekatain, B., Maarof, Mohd. Aizaini
Published 2011Book Section -
11
Symmetric Key Size for Different Level of Information Classification by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2006
Conference or Workshop Item -
12
A Review on Biological Inspired Computation in Cryptology by Ibrahim, Subariah, Maarof, Mohd Aizaini
Published 2005
Article -
13
Modified key size determination models for symmetric ciphers by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2005Conference or Workshop Item -
14
Diffusion analysis af a scalable fiestel network by Ibrahim, Subariah, Maarof, Mohd. Aizaini
Published 2005Conference or Workshop Item -
15
Detection of DoS attacks using intrusion detection sensors by Maarof, Mohd. Aizaini, Pathemanthan, Ramakrishna
Published 2002Conference or Workshop Item -
16
Cryptanalysis using biological inspired computing approaches by Ahmad, Badrisham, Maarof, Mohd. Aizaini
Published 2006
Conference or Workshop Item -
17
Polymorphism and danger susceptibility of system call DASTONs by Maarof, Mohd. Aizaini, Iqbal, Anjum
Published 2007Book Section -
18
Real valued negative selection for anomaly detection in wireless ad hoc networks by Abdul Majid, Azri, Maarof, Mohd. Aizaini
Published 2004
Conference or Workshop Item -
19
-
20