关注
Azuan Ahmad
标题
引用次数
引用次数
年份
Security risk assessment framework for cloud computing environments
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Security and Communication Networks 7 (11), 2114-2124, 2014
1062014
Graduate employability post-COVID-19: the case of a Malaysian public university
MIH Kamaruddin, A Ahmad, MA Husain, SN Abd Hamid
Higher Education, Skills and Work-Based Learning 11 (3), 710-724, 2021
422021
Image detection model for construction worker safety conditions using faster R-CNN
MM Saudi, AH Ma’arof, A Ahmad, ASM Saudi, MH Ali, A Narzullaev, ...
International Journal of Advanced Computer Science and Applications 11 (6), 2020
202020
CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism
A Ahmad, NB Idris, MN Kama
International Journal of Communication Networks and Information Security 9 …, 2017
192017
A new cryptojacking malware classifier model based on dendritic cell algorithm
A Ahmad, W Shafiuddin, MN Kama, MM Saudi
Proceedings of the 3rd International Conference on Vision, Image and Signal …, 2019
132019
The development and application of the zakat collection blockchain system
KF Khairi, NH Laili, H Sabri, A Ahmad, VH Pham, MD Tran
J. Gov. Regul, 2023
112023
Mobile application of food recommendation for allergy baby using rule-based technique
AA Shari, NA Pajar, N Sabri, MRM Noordin, FMI Zainudin, AS Shari, ...
2019 IEEE international conference on automatic control and intelligent …, 2019
102019
Traditional security risk assessment methods in cloud computing environment: usability analysis
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Jurnal Teknologi 73 (2), 85-89, 2015
102015
Danger theory based hybrid intrusion detection systems for cloud computing
A Ahmad, B Shanmugam, NB Idris, GN Samy
International Journal of Computer and Communication Engineering 2 (6), 650, 2013
102013
Enhancement and implementation of network access control architecture for virtualization environments
H Annuar, B Shanmugam, A Ahmad, NB Idris, SH AlBakri, GN Samy
2013 International Conference on Informatics and Creative Multimedia, 314-320, 2013
92013
A recent assessment for the ransomware attacks against the internet of medical things (iomt): A review
T Nusairat, MM Saudi, AB Ahmad
2023 IEEE 13th International Conference on Control System, Computing and …, 2023
82023
A theoretical comparative analysis of DNA techniques used in dna based cryptography
NAN Abdullah, NH Zakaria, AH Ab Halim, FHM Ridzuan, A Ahmad, ...
Journal of Sustainability Science and Management 17 (5), 165-178, 2022
72022
A case study for the cloud computing security threats in a governmental organization
SH Albakri, B Shanmgam, GN Samy, NB Idris, A Ahmed
2014 International Conference on Computer, Communications, and Control …, 2014
72014
Modelling fuel cut off controller on CNG engines using fuzzy logic: a prototype
S Munahar, M Setiyo, MM Saudi, A Ahmad, D Yuvenda
International Journal on Advanced Science, Engineering and Information …, 2022
62022
Detection of social media exploitation via SMS and camera
MA Azhar, MM Saudi, A Ahmad, AA Bakar
International Association of Online Engineering, 2019
62019
Legal issues in e-wallet practices
MZ Md Noor, A Mohamed Naim, NA Muhamed, AAI Mirza, A Ahmad, ...
UUM Journal of Legal Studies (UUMJLS) 12 (02), 229-252, 2021
52021
Crytojacking Classification based on Machine Learning Algorithm
WNABW Mansor, A Ahmad, WS Zainudin, MM Saudi, MN Kama
Proceedings of the 2020 8th International Conference on Communications and …, 2020
52020
State of the Art Intrusion Detection System for Cloud Computing
A Ahmad, WS Zainudin, MN Kama, NB Idris, MM Saudi, NH Zakaria
International Journal of Communication Networks and Information Security 10 …, 2018
52018
Cloud Computing Adoption Challenges
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Advanced Science Letters 20 (2), 546-548, 2014
52014
ACADEMIC FACTORs AssOCIATED WITh BuRNOuT IN MALAYsIAN MEDICAL sTuDENTs: A CROss-sECTIONAL sTuDY
N Daud, MNM Pa, AFA Rahim, A Ahmad, NM Hassan
Education in Medicine Journal 12 (2), 49-58, 2020
42020
系统目前无法执行此操作,请稍后再试。
文章 1–20