Browsing by Author Jamil, N.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 16 to 35 of 46 < previous   next >
Issue DateTitleAuthor(s)
2017Implementation of lightweight cryptographic primitivesHammad, B.T. ; Jamil, N. ; Rusli, M.E. ; Z’Aba, M.R. ; Ahmed, I.T. 
2015Implementation of PRINCE algorithm in FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. ; Tariq, B. 
2019Improve of contrast-distorted image quality assessment based on convolutional neural networksAhmed, I.T. ; Der, C.S. ; Jamil, N. ; Mohamed, M.A. 
2019An improved indoor location technique using combination of kalman filter and centroid positioningAziz, N.F.N.A. ; Jamil, N. ; Din, M.M. 
2016An Improved Indoor Positioning Algorithm Based on RSSI-Trilateration Technique for Internet of Things (IOT)Rusli, M.E. ; Ali, M. ; Jamil, N. ; Din, M.M. 
2014Improved S-box construction from binomial power functionsIsa, H. ; Jamil, N. ; Z'aba, M.R. 
2018Indoor positioning: Technology comparison analysisDin, M.M. ; Jamil, N. ; Maniam, J. ; Mohamed, M.A. 
2015Information security governance model to enhance zakat information management in Malaysian zakat institutionsSulaiman, H. ; Jamil, N. 
2019IoT honeypot: A review from researcher's perspectiveRazali, M.F. ; Muruti, G. ; Razali, M.N. ; Jamil, N. ; Mansor, F.Z. 
2016Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. 
2018Photon: A new mix columns architecture on FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Mohamed, M.A. 
2018A practical SCADA testbed in electrical power system environment for cyber-security exercisesJamil, N. ; Qassim, Q. ; Daud, M. ; Abidin, I.Z. ; Jaaffar, N. ; Kamarulzaman, W.A.W. 
2015PRINCE IP-core on Field Programmable Gate Arrays (FPGA)Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. 
2019Prototyping a lightweight encryption on a field programmable gate array for securing tele-control dataJidin, R. ; Tukijan, S.N. ; Al-Bahadly, I. ; Jamil, N. ; Qassim, Q.S. 
2010Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generationEl-Orany, F.A.A. ; Wahiddin, M.R.B. ; Mat-Nor, M.-A. ; Jamil, N. ; Bahari, I. 
2018Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networksMuzakkari, B.A. ; Mohamed, M.A. ; Abdul Kadir, M.F. ; Mohamad, Z. ; Jamil, N. 
2016Reusable data-path architecture for encryption-then-authentication on FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zaba, M.R. 
2018Review of indoor localization techniquesDin, M.M. ; Jamil, N. ; Maniam, J. ; Mohamed, M.A. 
2019A review of security assessment methodologies in industrial control systemsQassim, Q.S. ; Jamil, N. ; Daud, M. ; Patel, A. ; Ja’affar, N. 
2018A review: Towards practical attack taxonomy for industrial control systemsQassim, Q.S. ; Jamil, N. ; Jidin, R. ; Rusli, M.E. ; Ahmad Zawawi, M.N. ; Jamaludin, M.Z. ; Z'aba, M.R. ; Kamarulzaman, W.A.W.