Abstract is missing.
- LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor NetworksNurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam. 1-6 [doi]
- A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection ModelUmara Urooj, Mohd Aizaini Bin Maarof, Bander Ali Saleh Al-rimy. 1-6 [doi]
- News Event Prediction using Causality Approach on South China Sea ConflictTeo Wen Long, Anazida Zainal, Mohd Nizam Kassim. 1-6 [doi]
- A New Feature in Mysejahtera Application to Monitoring the Spread of COVID-19 Using Fog ComputingTaj-Aldeen Naser Abdali, Rosilah Hassan, Azana Hafizah Mohd Aman. 1-4 [doi]
- Vaccination System using Blockchain Technology: A Prototype DevelopmentMonafin Afif Fiquaro, Raja Zahilah, Siti Hajar Othman, Marina Md Arshad, Sheikh Munir Sheikh Saad. 1-6 [doi]
- Cryptocurrencies Investigation: A Methodology for the Preservation of CryptowalletsSarah K. Taylor, Aswami Ariffin, Khairul Akram Zainol Ariffin, Siti Norul Huda Sheikh Abdullah. 1-5 [doi]
- Comparison Multi Transfer Learning Models for Deep Fake Image RecognizerNur Aizah Rosli, Siti Norul Huda Sheikh Abdullah, Ahmad Nazri Zamani, Anahita Ghazvini, Nor Sakinah Md Othman, Nor Alia Athirah Abdul Muariff Tajuddin. 1-6 [doi]
- Advanced Persistent Threat Detection: A SurveyAdam Khalid, Anazida Zainal, Mohd. Aizaini Maarof, Fuad A. Ghaleb. 1-6 [doi]
- Data Wiping Tool: ByteEditor TechniqueNuraqilah Haidah Ahmad Riduan, Cik Feresa Mohd Foozy, Isredza Rahmi A. Hamid, Palaniappan Shamala, Nur Fadzilah Othman. 1-6 [doi]
- Secured Data Storage Framework for Land Registration using Blockchain TechnologySalman Humdullah, Siti Hajar Othman, Muhammad Najib Razali, Hazinah Kutty Mammi. 1-6 [doi]
- URL Classification based on Active Learning ApproachRakotoasimbahoaka Antsa Cyprienna, Raharijaona Zo Lalaina Yannick, Iadaloharivola Randria, Nicolas Raft Razafindrakoto. 1-6 [doi]
- A Steganography Embedding Method Based on Psingle / Pdouble and Huffman CodingMustafa Sabah Taha, Mohammed Hashim Mahdi, Hiyam N. Khalid, Azana Hafizah Mohd Aman, Zainab Senan Attarbashi. 1-6 [doi]
- HAC: Model for Privacy-Preserving Outsourced Data Over CloudHuda Osman, Maheyzah Md Siraj, Mohd Aizaini Maarof. 1-4 [doi]
- Performance Analysis of Internet of Things Routing Protocol for Low Power and Lossy Networks (RPL): Energy, Overhead and Packet DeliveryTan Woei Ching, Azana Hafizah Mohd Aman, Wan Muhd Hazwan Azamuddin, Hasimi Sallehuddin, Zainab Senan Attarbashi. 1-6 [doi]
- Secured Tracking and Tracing System Based on Blockchain TechnologyMohamed Mostafa Ali Montaser, Siti Hajar Othman, Raja Zahilah Raja Md Radzi. 1-6 [doi]
- A Secure Integrated E-Wallet Mobile Application For Education InstitutionJulia Juremi, Salasiah Sulaiman, Haridasan Balakrishnan, Nurul Husna Mohd Saad. 1-6 [doi]
- Intrusion Detection on the In-Vehicle Network Using Machine LearningShaila Sharmin, Hafizah Mansor. 1-6 [doi]
- Performance Evaluation of AODV Routing Protocol in MANET using NS-3 SimulatorTan Woei Ching, Azana Hafizah Mohd Aman, Wan Muhd Hazwan Azamuddin, Zainab Senan Attarbashi. 1-4 [doi]
- Digital Evidence Case Management Tool for Collaborative Digital Forensics InvestigationVimal Raj Silvarajoo, Shu Yun Lim, Paridah Daud. 1-4 [doi]
- Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature SelectionNoor Azeera Abdul Aziz, Mohd Aizaini Maarof, Anazida Zainal. 1-6 [doi]
- Ransomware Anti-Analysis and Evasion Techniques: A Survey and Research DirectionsMohammad N. Olaimat, Mohd Aizaini Maarof, Bander Ali Saleh Al-rimy. 1-6 [doi]
- Lightweight Cryptography for Resource Constraint Devices: Challenges and RecommendationAhmad Mustafa Mohamad Al-Aboosi, Samar Kamil, Siti Norul Huda Sheikh Abdullah, Khairul Akram Zainol Ariffin. 1-6 [doi]
- A New Decentralized Certification Verification Privacy Control ProtocolOmar S. Saleh, Osman Ghazali, Norbik Bashah Idris. 1-6 [doi]
- A Secure Multi Factor User Authentication Framework for Electronic Payment SystemMd Arif Hassan, Zarina Shukur. 1-6 [doi]
- Dimensionality Inspection for Wireless Sensor Network Deployment using Multi-Objective OptimizationAhmed Mahdi Jubair, Azana Hafizah Mohd Aman, Rosilah Hassan, Hasimi Sallehudin. 1-5 [doi]
- A Review of Digital Forensics Framework for Blockchain in Cryptocurrency TechnologyMohd Zaki Mas'ud, Aslinda Hassan, Wahidah Md. Shah, Shekh Faisal Abdul-Latip, Rabiah Ahmad, Aswami Ariffin, Zahri Yunos. 1-6 [doi]
- Application of Knowledge-oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict IssuesKoh Leong Chien, Anazida Zainal, Fuad A. Ghaleb, Mohd Nizam Kassim. 1-7 [doi]
- Information System Audit for Mobile Device Security AssessmentNoor Ashitah Abu Othman, Azah-Anir Norman, Miss Laiha Mat Kiah. 1-6 [doi]
- Comparison of Fake News Detection using Machine Learning and Deep Learning TechniquesSaeed Amer Alameri, Masnizah Mohd. 1-6 [doi]
- Quantitative Evaluation of IEEE 802.15.4 and ISA 100.11a for large scale Wireless Sensor NetworkAbdulrahman Sameer Sadeq, Azana Hafizah Mohd Aman, Rosilah Hassan, Hasimi Sallehudin. 1-5 [doi]