Cyber security for cyber physcial systems: A trust-based approach A Saqib, RW Anwar, OK Hussain, M Ahmad, MA Ngadi, MM Mohamad, ... J Theor Appl Inf Technol 71 (2), 144-152, 2015 | 36 | 2015 |
Risk assessment of IT governance: A systematic literature review. NC Pa, A BOKOLO JNR, RNH Nor, MAA Murad Journal of Theoretical & Applied Information Technology 71 (2), 2015 | 33 | 2015 |
A framework for adoption and implementation of green IT/IS practice in IT governance BA Jnr, NC Pa The Third International Conference on Green Computing, Technology and …, 2015 | 30 | 2015 |
A survey on approaches in knowledge audit in organizations NC Pa, L Taheri, R Abdullah Asian Transaction on Computers 2 (5), 1-8, 2012 | 30 | 2012 |
Requirement elicitation: identifying the communication challenges between developer and customer NC Pa, AM Zin International Journal of New Computer Architectures and their Applications …, 2011 | 30 | 2011 |
Open source software selection using an analytical hierarchy process (AHP) YY Jusoh, K Chamili, NC Pa, JH Yahaya American Journal of Software Engineering and Applications 3 (6), 83-89, 2014 | 28 | 2014 |
Measuring communication gap in software requirements elicitation process AM Zin, N Pa Proceedings of the 8th WSEAS International Conference on Software …, 2009 | 27 | 2009 |
Fakebuster: Fake news detection system using logistic regression technique in machine learning MS Mokhtar, YY Jusoh, N Admodisastro, N Pa, AY Amruddin International Journal of Engineering and Advanced Technology 9 (1), 2407-2410, 2019 | 21 | 2019 |
A case based reasoning architecture and component based model for Green IS implementation and diffusion in organisation BA Jnr, NC Pa IJDIWC, 97, 2016 | 21 | 2016 |
A knowledge audit model for requirement elicitation: A case study to assess knowledge in requirement elicitation L Taheri, MY Shafazand, NC Pa, R Abdullah, S Abdullah Knowledge and Process Management 24 (4), 257-268, 2017 | 19 | 2017 |
Autonomic computing systems utilizing agents for risk mitigation of IT governance BA Jnr, NC Pa, TNM Aris, RNH Nor, YY Jusoh Jurnal Teknologi 77 (18), 2015 | 19 | 2015 |
The selection criteria of open source software adoption in Malaysia Y Jusoh, K Chamili, JH Yahaya, NC Pa International Journal of Advancements in Computing Technology 4 (21), 278-287, 2012 | 17 | 2012 |
A Review on Decision Making of Risk Mitigation for Software Management. NCHE PA, BA JNR Journal of Theoretical & Applied Information Technology 76 (3), 2015 | 15 | 2015 |
An analysis of knowledge sharing behaviors in requirement engineering through social media L Wu, NC Pa, R Abdullah, WNWA Rahman 2015 9th Malaysian Software Engineering Conference (MySEC), 93-98, 2015 | 14 | 2015 |
A Proposed Risk Assessment Model For Decision Making In Software Management N Pa, M Khalefa, H Alasadi, H Zmezm Journal of Soft Computing and Decision Support Systems (JSCDSS) 3 (5), 31-43, 2016 | 12* | 2016 |
Developing a Learning Outcome-Based Question Examination Paper Tool for Universiti Putra Malaysia. S Hassan, NI Admodisastro, A Kamaruddin, S Baharom, NC Pa International Education Studies 9 (2), 132-140, 2016 | 12 | 2016 |
A risk assessment model for collaborative support in software management B Anthony, NC Pa, RNH Nor, YY Josoh 2015 9th Malaysian Software Engineering Conference (MySEC), 217-223, 2015 | 12 | 2015 |
Identifying knowledge components in software requirement elicitation L Taheri, NC Pa, R Abdullah, S Abdullah, MY Shafazand 2014 IEEE International Conference on Industrial Engineering and Engineering …, 2014 | 12 | 2014 |
Knowledge audit model for requirement elicitation process L Taheri, N Che Pa, R Abdullah, S Abdullah International Scholarly and Scientific Research & Innovation 8 (2), 452-456, 2014 | 12 | 2014 |
Azainil.“User difficulties in E-learning system,” RA Ramadiani, MH Selamat, R Abdullah, NC Pa 2nd International Conference on Science in Information Technology (ICSITech …, 2017 | 9 | 2017 |