Browsing by Author Jamil, N.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 36 to 46 of 46 < previous 
Issue DateTitleAuthor(s)
2013S-box construction from non-permutation power functionsIsa, H. ; Jamil, N. ; Z'aba, M.R. 
2016S-box optimisation using heuristic methodsIsa, H. ; Jamil, N. ; Z'Aba, M.R. 
2015Security issues of ad-hoc network of sensor node in disaster mitigation planSameon, S.S. ; Jamil, N. 
2018Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA systemQassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. 
2018Small Footprint Mix-Column Serial for PHOTON and LED Lightweight CryptographyAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zraba, M.R. ; Al-Azawi, S. 
2012STITCH-256: A dedicated cryptographic hash functionJamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
2018A Study on security vulnerabilities assessment and quantification in SCADA systemsFirdaus, Z. ; Jamil, N. ; Qassim, Q.S. ; Rusli, M.E. ; Ja'affar, N. ; Daud, M. ; Hasan, H. 
2019Towards implementing scalable and reconfigurable SCADA security testbed in power system environmentSaif Qassim, Q. ; Jamil, N. ; Daud, M. ; Che Hasan, H. 
2018TPAL: A protocol for node authentication in IoTRazali, M.F. ; Rusli, M.E. ; Jamil, N. ; Yussof, S. 
2010A user authentication scheme based on identity-bits commitment for wireless sensor networksJamil, N. ; Sameon, S.S. ; Mahmood, R. 
2018Utilizing AlexNet Deep Transfer Learning for Ear RecognitionAlmisreb, A.A. ; Jamil, N. ; Din, N.M.