Showing results 21 to 40 of 46
< previous
next >
Issue Date | Title | Author(s) |
2014 | Improved S-box construction from binomial power functions | Isa, H. ; Jamil, N. ; Z'aba, M.R. |
2018 | Indoor positioning: Technology comparison analysis | Din, M.M. ; Jamil, N. ; Maniam, J. ; Mohamed, M.A. |
2015 | Information security governance model to enhance zakat information management in Malaysian zakat institutions | Sulaiman, H. ; Jamil, N. |
2019 | IoT honeypot: A review from researcher's perspective | Razali, M.F. ; Muruti, G. ; Razali, M.N. ; Jamil, N. ; Mansor, F.Z. |
2016 | Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. |
2018 | Photon: A new mix columns architecture on FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Mohamed, M.A. |
2018 | A practical SCADA testbed in electrical power system environment for cyber-security exercises | Jamil, N. ; Qassim, Q. ; Daud, M. ; Abidin, I.Z. ; Jaaffar, N. ; Kamarulzaman, W.A.W. |
2015 | PRINCE IP-core on Field Programmable Gate Arrays (FPGA) | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. |
2019 | Prototyping a lightweight encryption on a field programmable gate array for securing tele-control data | Jidin, R. ; Tukijan, S.N. ; Al-Bahadly, I. ; Jamil, N. ; Qassim, Q.S. |
2010 | Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generation | El-Orany, F.A.A. ; Wahiddin, M.R.B. ; Mat-Nor, M.-A. ; Jamil, N. ; Bahari, I. |
2018 | Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networks | Muzakkari, B.A. ; Mohamed, M.A. ; Abdul Kadir, M.F. ; Mohamad, Z. ; Jamil, N. |
2016 | Reusable data-path architecture for encryption-then-authentication on FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zaba, M.R. |
2018 | Review of indoor localization techniques | Din, M.M. ; Jamil, N. ; Maniam, J. ; Mohamed, M.A. |
2019 | A review of security assessment methodologies in industrial control systems | Qassim, Q.S. ; Jamil, N. ; Daud, M. ; Patel, A. ; Ja’affar, N. |
2018 | A review: Towards practical attack taxonomy for industrial control systems | Qassim, Q.S. ; Jamil, N. ; Jidin, R. ; Rusli, M.E. ; Ahmad Zawawi, M.N. ; Jamaludin, M.Z. ; Z'aba, M.R. ; Kamarulzaman, W.A.W. |
2013 | S-box construction from non-permutation power functions | Isa, H. ; Jamil, N. ; Z'aba, M.R. |
2016 | S-box optimisation using heuristic methods | Isa, H. ; Jamil, N. ; Z'Aba, M.R. |
2015 | Security issues of ad-hoc network of sensor node in disaster mitigation plan | Sameon, S.S. ; Jamil, N. |
2018 | Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system | Qassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. |
2018 | Small Footprint Mix-Column Serial for PHOTON and LED Lightweight Cryptography | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zraba, M.R. ; Al-Azawi, S. |