A comparative study of data anonymization techniques S Murthy, AA Bakar, FA Rahim, R Ramli 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019 | 90 | 2019 |
Internet of Things (IoT) architecture for flood data management AA Ghapar, S Yussof, AA Bakar International journal of future generation communication and networking 11 …, 2018 | 59 | 2018 |
A review on trust factors affecting purchase Intention on Instagram SM Din, R Ramli, AA Bakar 2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018 | 30 | 2018 |
A review of factors that influenced online trust in social commerce AD Noor, R Sulaiman, AA Bakar Proceedings of the 6th international conference on information technology …, 2014 | 27 | 2014 |
Determining the types of diseases and emergency issues in Pilgrims during Hajj: A literature review SMR Al-Masud, AA Bakar, S Yussof Stat Inf 5 (7), 2016 | 25 | 2016 |
Forming trust in mobile ad hoc network AA Bakar, R Ismail, J Jais 2009 WRI International Conference on Communications and Mobile Computing 3 …, 2009 | 19 | 2009 |
Anaesthetists’ nightmare: masseter spasm after induction in an undiagnosed case of myotonia congenita I Looi, AA Bakar, CH Lim, TH Khoo, PE Samuel Med J Malaysia 63 (5), 423, 2008 | 19 | 2008 |
Preserving author editing history using blockchain technology MS Mohd Pozi, G Muruti, A Abu Bakar, A Jatowt, Y Kawai Proceedings of the 18th ACM/IEEE on Joint Conference on Digital Libraries …, 2018 | 16 | 2018 |
A review on extended role based access control (E-RBAC) model in pervasive computing environment AA Bakar, R Ismail, J Jais 2009 First International Conference on Networked Digital Technologies, 533-535, 2009 | 16 | 2009 |
Computational analysis of time-fractional models in energy infrastructure applications I Ahmad, AA Bakar, I Ali, S Haq, S Yussof, AH Ali Alexandria Engineering Journal 82, 426-436, 2023 | 15 | 2023 |
Access control and privacy in MANET emergency environment AA Bakar, AA Ghapar, R Ismail 2014 International Conference on Computer and Information Sciences (ICCOINS …, 2014 | 14 | 2014 |
Ensuring data privacy and security in MANET: Case in emergency rescue mission A Bakar, R Ismail, AAR Hmad, JL Manan Proceedings of the international conference on information and knowledge …, 2012 | 14 | 2012 |
Review of literatures on trust factors affecting customer's purchase intention on SOHO seller: S-commerce context R Ramli, AA Bakar, N Aziz International Information Institute (Tokyo). Information 19 (7B), 2791, 2016 | 11 | 2016 |
Blockchain and the personal data protection act 2010 (PDPA) in Malaysia H Baskaran, S Yussof, FA Rahim, AA Bakar 2020 8th International Conference on Information Technology and Multimedia …, 2020 | 10 | 2020 |
The trust effect towards online seller in social commerce R Ramli, AA Bakar, R Ismail, N Aziz Proceedings of the 6th International Conference on Computing and Informatics …, 2017 | 10 | 2017 |
Exploration study of skillsets needed in cyber security field FH Sohime, R Ramli, FA Rahim, AA Bakar 2020 8th International Conference on Information Technology and Multimedia …, 2020 | 9 | 2020 |
Model of security level classification for data in hybrid cloud computing M Shakir, A Abubakar, O Yousoff, M Waseem, M Al-Emran Asian Research Publishing Network, 2016 | 9 | 2016 |
Value management and client attitude in developing sustainable construction KM Roufechael, AH Abu Bakar, AA Tabassi Advances in Environmental Biology 9 (5), 4-6, 2015 | 9 | 2015 |
Trust formation based on subjective logic and pgp web-of-trust for information sharing in mobile ad hoc networks AA Bakar, R Ismail, AR Ahmad, JLA Manan 2010 IEEE Second International Conference on Social Computing, 1004-1009, 2010 | 9 | 2010 |
Diagnosis security problems in cloud computing for business cloud M Shakir, A ABUBAKA, Y YOUSOFF, ALI SAGHER, H Alkayali Journal of Theoretical and Applied Information Technology, 2015 | 8 | 2015 |