Follow
Mohammad Adib Khairuddin
Title
Cited by
Cited by
Year
Establishing a soldier wireless sensor network (WSN) communication for military operation monitoring
MN Ismail, MA Shukran, MRM Isa, M Adib, O Zakaria
Int. J. Inf. Commun. Technol 7 (2), 89-95, 2018
212018
Mobile Agents in Intrusion Detection System: Review and Analysis
K Maskat, MAM Shukran, MA Khairuddin, MRM Isa
Modern Applied Science 5 (6), 218, 2011
142011
The design of fingerprint biometric authentication on smart card for PULAPOT main entrance system
MRM Isa, YH Yahaya, MHM Halip, MA Khairuddin, K Maskat
2010 International Symposium on Information Technology 3, 1-4, 2010
122010
Colour Features Extraction Techniques and Approaches for Content-Based Image Retrieval (CBIR) System
MN Abdullah, MAM Shukran, MRM Isa, NSM Ahmad, MA Khairuddin, ...
Journal of Materials Science and Chemical Engineering 9 (7), 29-34, 2021
102021
Disaster management support model for Malaysia
HE Che Hamid, NJA MSaad, NA Mat Razali, MA Khairuddin, MN Ismail, ...
Advances in Visual Informatics: 6th International Visual Informatics …, 2019
82019
Significance of likes: Analysing passive interactions on Facebook during campaigning
MA Khairuddin, A Rao
PloS one 12 (6), e0179435, 2017
82017
STUDENT PERCEPTION STUDY ON SMART CAMPUS: A CASE STUDY ON HIGHER EDUCATION INSTITUTION
MF Mustafa, MRM Isa, UFA Rauf, MN Ismail, MAM Shukran, ...
Malaysian Journal of Computer Science, 1-20, 2021
62021
Developing A Framework for Accident Detecting and Sending Alert Message Using Android Application
MAM Shukran, MN Abdullah, MRM Isa, MN Ismail, MA Khairuddin, ...
International Journal of Engineering & Technology 7 (4.29), 66-68, 2018
52018
SIEM Network Behaviour Monitoring Framework using Deep Learning Approach for Campus Network Infrastructure
M Azmi Bin Mustafa Sulaiman, M Adib Khairuddin, M Rizal Mohd Isa, ...
International journal of electrical and computer engineering systems, 9-21, 2021
42021
Friday 30th September, 2016
MA Khairuddin
RMIT University, 2016
4*2016
Risk mitigation strategies for the prepaid card issuer in Australia
MA Khairuddin, P Zhang, A Rao
Security Research Centre, School of Computer and Security Science, Edith …, 2008
42008
Modeling Critical Successfulness Factors of Mobile Game Applications for Military Training
MM Asri, ADK Anuar, AFA Fadzlah, N Wahab, MA Shukran, ...
Proceedings Paper Inspirational Scholar Symposium (ISS), 371-378, 2019
32019
Recent trends in data classifications
MAM Shukran, MA Khairuddin, K Maskat
International Conference on Industrial and Intelligent Information (ICIII …, 2012
32012
Consumers perception on prepaid cards: Survey and analysis
MA Khairuddin, MAM Shukran, K Maskat, MRM Isa
Modern Applied Science 6 (1), 131, 2012
32012
Exploring the information security culture within industrial control systems organisations: Expert reviews
S Ismail, MN Ismail, A Ahmad, MA Khairuddin
AIP Conference Proceedings 2617 (1), 2022
12022
Survey on Clustering Techniques for Image Categorization Dataset
MAM Shukran, MSFM Yunus, MN Abdullah, MRM Isa, MA Khairuddin, ...
Journal of Computer and Communications 10 (6), 177-185, 2022
12022
Designing Intelligent Secure Android Application for Effective Chemical Inventory
MAM Shukran, MN Abdullah, MN Ismail, K Maskat, MRM Isa, MS Ishak, ...
IOP Conference Series: Materials Science and Engineering 226 (1), 012086, 2017
12017
Study of Intelligent Secure Chemical Inventory Management System
MAM Shukran, MN Abdullah, MN Ismail, K Maskat, MRM Isa, MS Ishak, ...
IOP Conference Series: Materials Science and Engineering 226 (1), 012085, 2017
12017
Online election campaigning: Identifying political parties using likes and comments
J Liebig, MA Khairuddin, A Rao
Complex Networks & Their Applications V: Proceedings of the 5th …, 2017
12017
Using Agent Based SNORT in Intrusion Detection Systems
K Maskat, MAM Shukran, MA Khairuddin
International Conference on Industrial and Intelligent Information (ICIII …, 2012
12012
The system can't perform the operation now. Try again later.
Articles 1–20