Showing results 25 to 44 of 46
< previous
next >
Issue Date | Title | Author(s) |
2016 | Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. |
2018 | Photon: A new mix columns architecture on FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Mohamed, M.A. |
2018 | A practical SCADA testbed in electrical power system environment for cyber-security exercises | Jamil, N. ; Qassim, Q. ; Daud, M. ; Abidin, I.Z. ; Jaaffar, N. ; Kamarulzaman, W.A.W. |
2015 | PRINCE IP-core on Field Programmable Gate Arrays (FPGA) | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. |
2019 | Prototyping a lightweight encryption on a field programmable gate array for securing tele-control data | Jidin, R. ; Tukijan, S.N. ; Al-Bahadly, I. ; Jamil, N. ; Qassim, Q.S. |
2010 | Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generation | El-Orany, F.A.A. ; Wahiddin, M.R.B. ; Mat-Nor, M.-A. ; Jamil, N. ; Bahari, I. |
2018 | Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networks | Muzakkari, B.A. ; Mohamed, M.A. ; Abdul Kadir, M.F. ; Mohamad, Z. ; Jamil, N. |
2016 | Reusable data-path architecture for encryption-then-authentication on FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zaba, M.R. |
2018 | Review of indoor localization techniques | Din, M.M. ; Jamil, N. ; Maniam, J. ; Mohamed, M.A. |
2019 | A review of security assessment methodologies in industrial control systems | Qassim, Q.S. ; Jamil, N. ; Daud, M. ; Patel, A. ; Ja’affar, N. |
2018 | A review: Towards practical attack taxonomy for industrial control systems | Qassim, Q.S. ; Jamil, N. ; Jidin, R. ; Rusli, M.E. ; Ahmad Zawawi, M.N. ; Jamaludin, M.Z. ; Z'aba, M.R. ; Kamarulzaman, W.A.W. |
2013 | S-box construction from non-permutation power functions | Isa, H. ; Jamil, N. ; Z'aba, M.R. |
2016 | S-box optimisation using heuristic methods | Isa, H. ; Jamil, N. ; Z'Aba, M.R. |
2015 | Security issues of ad-hoc network of sensor node in disaster mitigation plan | Sameon, S.S. ; Jamil, N. |
2018 | Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system | Qassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. |
2018 | Small Footprint Mix-Column Serial for PHOTON and LED Lightweight Cryptography | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zraba, M.R. ; Al-Azawi, S. |
2012 | STITCH-256: A dedicated cryptographic hash function | Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. |
2018 | A Study on security vulnerabilities assessment and quantification in SCADA systems | Firdaus, Z. ; Jamil, N. ; Qassim, Q.S. ; Rusli, M.E. ; Ja'affar, N. ; Daud, M. ; Hasan, H. |
2019 | Towards implementing scalable and reconfigurable SCADA security testbed in power system environment | Saif Qassim, Q. ; Jamil, N. ; Daud, M. ; Che Hasan, H. |
2018 | TPAL: A protocol for node authentication in IoT | Razali, M.F. ; Rusli, M.E. ; Jamil, N. ; Yussof, S. |