Search

Your search keyword '"Norafida Ithnin"' showing total 83 results

Search Constraints

Start Over You searched for: Author "Norafida Ithnin" Remove constraint Author: "Norafida Ithnin"
83 results on '"Norafida Ithnin"'

Search Results

1. CFaaS: bilaterally agreed evidence collection

2. Comparing Malware Attack Detection using Machine Learning Techniques in IoT Network Traffic

12. Probing Determinants Affecting Intention to Adopt Cloud Technology in E-Government Systems

21. Toward Rainfall Prediction Model for Early Warning System of Flood Disaster in Malaysia

25. Message Propagation in Vehicular Ad hoc Networks under free flow and congested flow Scenarios

26. The approaches to quantify web application security scanners quality: a review

27. Survey on Representation Techniques for Malware Detection System

29. Movement Pattern Extraction Method in OppNet Geocast Routing

30. A Survey of Geocast Routing Protocols in Opportunistic Networks

32. Investigating the Barriers of Health Information System implementation in Malaysian Public Hospitals

33. Automating Penetration Testing Within Ambiguous Testing Environment

34. Privacy Preserving Data Mining Based on Geometrical Data Transformation Method (GDTM) and K-Means Clustering Algorithm

35. A multi-criteria collaborative filtering recommender system for the tourism domain using Expectation Maximization (EM) and PCA–ANFIS

36. SBRT: API Signature Behaviour Based Representation Technique for Improving Metamorphic Malware Detection

37. Features Selection For Efficient Data Center Disaster Management Approach

38. A multi-criteria recommendation system using dimensionality reduction and Neuro-Fuzzy techniques

39. GRID-IMAGE PASSWORD BASED SCHEME: ENHANCING MEMORABILITY FEATURES OF PASSWORDS

40. Hybrid recommendation approaches for multi-criteria collaborative filtering

41. Multi-criteria collaborative filtering with high accuracy using higher order singular value decomposition and Neuro-Fuzzy system

42. Broadcasting in Connected and Fragmented Vehicular Ad Hoc Networks

43. BSM: Broadcasting of Safety Messages in Vehicular Ad Hoc Networks

44. Parallel RSA encryption based on tree architecture

45. Estimation of optimal machining control parameters using artificial bee colony

46. Dynamic Broadcasting in Vehicular Ad hoc Networks

48. A Comparative Study of Adaptive Neuro Fuzzy Inferences System (ANFIS) and Fuzzy Inference System (FIS) Approach for Trust in B2C Electronic Commerce Websites

49. Two Enhanced SVD based watermarking Algorithms using U Matrix

50. CAPTCHA: A Survey of Usability Features

Catalog

Books, media, physical & digital resources