Follow
Norziana Jamil
Title
Cited by
Cited by
Year
An improved indoor positioning algorithm based on rssi-trilateration technique for internet of things (iot)
ME Rusli, M Ali, N Jamil, MM Din
2016 international conference on computer and communication engineering …, 2016
1692016
Blockchain consensus: An overview of alternative protocols
DP Oyinloye, JS Teh, N Jamil, M Alawida
Symmetry 13 (8), 1363, 2021
1172021
A survey of scada testbed implementation approaches
Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ...
Indian Journal of Science and Technology 10 (26), 1-8, 2017
562017
A review of security assessment methodologies in industrial control systems
QS Qassim, N Jamil, M Daud, A Patel, N Ja’affar
Information & Computer Security 27 (1), 47-61, 2019
502019
Construction of cryptographically strong S-boxes inspired by bee waggle dance
H Isa, N Jamil, MR Z’aba
New generation computing 34, 221-238, 2016
462016
Differential cryptanalysis of WARP
JS Teh, A Biryukov
Journal of Information Security and Applications 70, 103316, 2022
39*2022
Threat modeling approaches for securing cloud computin
A Amini, N Jamil, AR Ahmad, MR Zaba
Journal of Applied Sciences 15 (7), 953-967, 2015
382015
Determinants of cloud computing integration and its impact on sustainable performance in SMEs: An empirical investigation using the SEM-ANN approach
MA Al-Sharafi, M Iranmanesh, M Al-Emran, AI Alzahrani, F Herzallah, ...
Heliyon 9 (5), 2023
352023
A survey of lightweight cryptographic hash function
BT Hammad, N Jamil, ME Rusli, MR Z’aba
Inter. J. Sci. Eng. Res 8, 806-814, 2017
342017
Cybersecurity of microgrid: state-of-the-art review and possible directions of future research
N Jamil, QS Qassim, FA Bohani, M Mansor, VK Ramachandaramurthy
Applied Sciences 11 (21), 9812, 2021
332021
Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networks
BA Muzakkari, MA Mohamed, MFA Kadir, Z Mohamad, N Jamil
International Journal of Advanced Computer Research 8 (38), 212-228, 2018
302018
IoT honeypot: A review from researcher's perspective
MF Razali, MN Razali, FZ Mansor, G Muruti, N Jamil
2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018
282018
Memory forensics-based malware detection using computer vision and machine learning
SSH Shah, AR Ahmad, N Jamil, AR Khan
Electronics 11 (16), 2579, 2022
272022
Authenticated encryption schemes: A systematic review
MA Jimale, MR Z’aba, MLBM Kiah, MYI Idris, N Jamil, MS Mohamad, ...
IEEE Access 10, 14739-14766, 2022
272022
I-PRESENTTM: An Involutive Lightweight Block Cipher
MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir
Journal of Information Security 2014, 2014
272014
Image copy-move forgery detection algorithms based on spatial feature domain
IT Ahmed, BT Hammad, N Jamil
2021 IEEE 17th International colloquium on signal processing & its …, 2021
262021
A comparative review on symmetric and asymmetric DNA-based cryptography
BT Hammad, AM Sagheer, IT Ahmed, N Jamil
Bulletin of Electrical Engineering and Informatics 9 (6), 2484-2491, 2020
262020
Information security governance model to enhance zakat information management in Malaysian zakat institutions
H Sulaiman, N Jamil
Proceedings of the 6th international conference on information technology …, 2014
252014
Implementation of PRINCE algorithm in FPGA
YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq
Proceedings of the 6th International Conference on Information Technology …, 2014
242014
A comprehensive review of existing risk assessment models in cloud computing
A Amini, N Jamil
Journal of Physics: Conference Series 1018 (1), 012004, 2018
222018
The system can't perform the operation now. Try again later.
Articles 1–20