Showing 1 - 20 results of 119 for search 'Mahmod, Ramlan', query time: 0.04s
Refine Results
-
1
-
2
Cellular automata based user authentication scheme using identity-bits commitment for wireless sensor network by Jamil, Norziana, Mahmod, Ramlan
Published 2011
Conference or Workshop Item -
3
Hybrid expert system of rough set and neural network by Yahia, Moawia Elfaki, Mahmod, Ramlan
Published 1999
Article -
4
A survey on cyber-crime prediction techniques by Shaerpour, Kaveh, Dehghantanha, Ali, Mahmod, Ramlan
Published 2013
Article -
5
A survey on digital forensics trends by Dehghantanha, Ali, Damshenas, Mohsen, Mahmod, Ramlan
Published 2014
Article -
6
A survey on malware propagation, analysis, and detection by Damshenas, Mohsen, Dehghantanha, Ali, Mahmod, Ramlan
Published 2013
Article -
7
A proposal for improving AES S-box with rotation and key-dependent by Juremi, Julia, Mahmod, Ramlan, Sulaiman, Salasiah
Published 2012
Conference or Workshop Item -
8
-
9
Key transformation approach for Rijndael security. by Muda, Zaiton, Mahmod, Ramlan, Sulong, Mek Rahmah
Published 2010
Article -
10
Towards green frameworks for digital forensics investigation by Dehghantanha, Ali, Mahmod, Ramlan, Udzir, Nur Izura
Published 2013
Article -
11
Rangkaian Neural Genetik Aplikasi dalam Pengecaman Aksara Jawi by Mahmod, Ramlan, Omar, Khairuddin, Sulaiman, Md. Nasir
Published 2000
Article -
12
Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan
Published 2013
Conference or Workshop Item -
13
-
14
Towards data centric mobile security by Dehghantanha, Ali, Udzir, Nur Izura, Mahmod, Ramlan
Published 2011
Conference or Workshop Item -
15
-
16
Sharp-edges method in Arabic text steganography by Roslan, Nuur Alifah, Mahmod, Ramlan, Udzir, Nur Izura
Published 2011
Article -
17
TC-enabled and distributed cloud computing access control model by Halboob, Waleed, Mahmod, Ramlan, Alghathbar, Khaled S., Mamat, Ali
Published 2014Article -
18
-
19
A distributed push-based XML access control model for better scalability by Halboob, Waleed Abduljabbar Mohammed, Mamat, Ali, Mahmod, Ramlan
Published 2008
Conference or Workshop Item -
20
Performance analysis for extended TLS with mutual attestation for platform integrity assurance by Abd Aziz, Norazah, Udzir, Nur Izura, Mahmod, Ramlan
Published 2014
Conference or Workshop Item