Showing results 31 to 46 of 46
< previous
Issue Date | Title | Author(s) |
2018 | Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networks | Muzakkari, B.A. ; Mohamed, M.A. ; Abdul Kadir, M.F. ; Mohamad, Z. ; Jamil, N. |
2016 | Reusable data-path architecture for encryption-then-authentication on FPGA | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zaba, M.R. |
2018 | Review of indoor localization techniques | Din, M.M. ; Jamil, N. ; Maniam, J. ; Mohamed, M.A. |
2019 | A review of security assessment methodologies in industrial control systems | Qassim, Q.S. ; Jamil, N. ; Daud, M. ; Patel, A. ; Ja’affar, N. |
2018 | A review: Towards practical attack taxonomy for industrial control systems | Qassim, Q.S. ; Jamil, N. ; Jidin, R. ; Rusli, M.E. ; Ahmad Zawawi, M.N. ; Jamaludin, M.Z. ; Z'aba, M.R. ; Kamarulzaman, W.A.W. |
2013 | S-box construction from non-permutation power functions | Isa, H. ; Jamil, N. ; Z'aba, M.R. |
2016 | S-box optimisation using heuristic methods | Isa, H. ; Jamil, N. ; Z'Aba, M.R. |
2015 | Security issues of ad-hoc network of sensor node in disaster mitigation plan | Sameon, S.S. ; Jamil, N. |
2018 | Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system | Qassim, Q.S. ; Jamil, N. ; Daud, M. ; Ja'affar, N. ; Yussof, S. ; Ismail, R. ; Kamarulzaman, W.A.W. |
2018 | Small Footprint Mix-Column Serial for PHOTON and LED Lightweight Cryptography | Abbas, Y.A. ; Jidin, R. ; Jamil, N. ; Zraba, M.R. ; Al-Azawi, S. |
2012 | STITCH-256: A dedicated cryptographic hash function | Jamil, N. ; Mahmod, R. ; Z'aba, M.R. ; Udzir, N.I. ; Zukarnain, Z.A. |
2018 | A Study on security vulnerabilities assessment and quantification in SCADA systems | Firdaus, Z. ; Jamil, N. ; Qassim, Q.S. ; Rusli, M.E. ; Ja'affar, N. ; Daud, M. ; Hasan, H. |
2019 | Towards implementing scalable and reconfigurable SCADA security testbed in power system environment | Saif Qassim, Q. ; Jamil, N. ; Daud, M. ; Che Hasan, H. |
2018 | TPAL: A protocol for node authentication in IoT | Razali, M.F. ; Rusli, M.E. ; Jamil, N. ; Yussof, S. |
2010 | A user authentication scheme based on identity-bits commitment for wireless sensor networks | Jamil, N. ; Sameon, S.S. ; Mahmood, R. |
2018 | Utilizing AlexNet Deep Transfer Learning for Ear Recognition | Almisreb, A.A. ; Jamil, N. ; Din, N.M. |