Browsing by Author Jamil, N.


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 26 to 45 of 46 < previous   next >
Issue DateTitleAuthor(s)
2018Photon: A new mix columns architecture on FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Mohamed, M.A. 
2018A practical SCADA testbed in electrical power system environment for cyber-security exercisesJamil, N. ; Qassim, Q. ; Daud, M. ; Abidin, I.Z. ; Jaaffar, N. ; Kamarulzaman, W.A.W. 
2015PRINCE IP-core on Field Programmable Gate Arrays (FPGA)Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Z'aba, M.R. ; Rusli, M.E. 
2019Prototyping a lightweight encryption on a field programmable gate array for securing tele-control dataJidin, R. ; Tukijan, S.N. ; Al-Bahadly, I. ; Jamil, N. ; Qassim, Q.S. 
2010Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generationEl-Orany, F.A.A. ; Wahiddin, M.R.B. ; Mat-Nor, M.-A. ; Jamil, N. ; Bahari, I. 
2018Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networksMuzakkari, B.A. ; Mohamed, M.A. ; Abdul Kadir, M.F. ; Mohamad, Z. ; Jamil, N. 
2016Reusable data-path architecture for encryption-then-authentication on FPGAAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zaba, M.R. 
2018Review of indoor localization techniquesDin, M.M. ; Jamil, N. ; Maniam, J. ; Mohamed, M.A. 
2019A review of security assessment methodologies in industrial control systemsQassim, Q.S. ; Jamil, N. ; Daud, M. ; Patel, A. ; Ja’affar, N. 
2018A review: Towards practical attack taxonomy for industrial control systemsQassim, Q.S. ; Jamil, N. ; Jidin, R. ; Rusli, M.E. ; Ahmad Zawawi, M.N. ; Jamaludin, M.Z. ; Z'aba, M.R. ; Kamarulzaman, W.A.W. 
2013S-box construction from non-permutation power functionsIsa, H. ; Jamil, N. ; Z'aba, M.R. 
2016S-box optimisation using heuristic methodsIsa, H. ; Jamil, N. ; Z'Aba, M.R. 
2015Security issues of ad-hoc network of sensor node in disaster mitigation planSameon, S.S. ; Jamil, N. 
2018Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA systemQassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. 
2018Small Footprint Mix-Column Serial for PHOTON and LED Lightweight CryptographyAbbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zraba, M.R. ; Al-Azawi, S. 
2012STITCH-256: A dedicated cryptographic hash functionJamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. 
2018A Study on security vulnerabilities assessment and quantification in SCADA systemsFirdaus, Z. ; Jamil, N. ; Qassim, Q.S. ; Rusli, M.E. ; Ja'affar, N. ; Daud, M. ; Hasan, H. 
2019Towards implementing scalable and reconfigurable SCADA security testbed in power system environmentSaif Qassim, Q. ; Jamil, N. ; Daud, M. ; Che Hasan, H. 
2018TPAL: A protocol for node authentication in IoTRazali, M.F. ; Rusli, M.E. ; Jamil, N. ; Yussof, S. 
2010A user authentication scheme based on identity-bits commitment for wireless sensor networksJamil, N. ; Sameon, S.S. ; Mahmood, R.