关注
Zul Hilmi Abdullah
Zul Hilmi Abdullah
在 newinti.edu.my 的电子邮件经过验证
标题
引用次数
引用次数
年份
An efficient trojan horse classification (ETC)
AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah
International Journal of Computer Science Issues (IJCSI) 10 (2), 96, 2013
232013
Towards a dynamic file integrity monitor through a security classification
ZH Abdullah, NI Udzir, R Mahmod, K Samsudin
Internal Journal of New Computer Architectures and their Applications …, 2011
92011
Document forensic, the fiqh and the Syariah Courts
WAFW Ismail, LA Mutalib, ZH Abdullah, NC Amani, MM Khir
Geografia 11 (4), 2015
82015
An efficient framework to build up malware dataset
MM Saudi, ZH Abdullah
International Journal of Computer and Information Engineering 7 (8), 1104-1109, 2013
82013
File Integrity Monitor Scheduling Based on File Security Level Classification
ZH Abdullah, NI Udzir, R Mahmod, K Samsudin
Software Engineering and Computer Systems, 177-189, 2011
82011
Kebolehpercayaan Maklumat Elektronik: Tinjauan Awal Terhadap Pelajar Tamhidi
ZH Abdullah, HS Ariffin, S Ismail, AN Rosli
Conference: 2nd International Convention of Islam, Science & Education di …, 2016
62016
Bentuk-bentuk pemalsuan dokumen menurut fiqh dan perundangan Islam di Malaysia: Satu analisa
WAF Wan Ismail, ZH Abdullah, AH Abd Murad, N Che Amani, LA Mutalib, ...
The e-Journal of Sultan Alauddin Sulaiman Shah 2 (1), 2015
62015
A New Efficient Credit Scoring Model for Personal Loan using Data Mining Technique Toward for Sustainability Management
RM Sum, W Ismail, ZH Abdullah, N FATHIHIN, MN SHAH, R HENDRADI
Journal of Sustainability Science and Management 17 (5), 60-76, 2022
52022
Study of the Availability and Awareness of E-services in Higher Education in Libya
ZAE Abdelsadeq, S Ismail, ZH Abdullah
Third International Conference on E-Learning and E-Technologies in Education …, 2014
52014
Kebolehpercayaan Maklumat Elektronik: Tinjauan Awal Terhadap Pelajar Tamhidi. 2nd International Convention of Islam
ZH Abdullah, HS Ariffin, S Ismail, AN Rosli
Science & Education. https://www. researchgate. net/publication …, 2016
42016
Designing a new model for trojan horse detection using sequential minimal optimization
M Mohd Saudi, AM Abuzaid, BM Taib, ZH Abdullah
Advanced Computer and Communication Engineering Technology: Proceedings of …, 2015
42015
Media Sosial Semasa Pandemik
S Ismail, HS Ariffin, ZH Abdullah
E-Proceeding: Seminar Antarabangsa Islam dan Sains (SAIS 2020), 156-165, 2020
32020
USER'S AWARENESS SURVEY ON 1CITIZEN PROGRAM IN UNIVERSITI SAINS ISLAM MALAYSIA (USIM).
S Ismail, ZH Abdullah, NH MOHD ALWI, MZ Jali
Journal of Theoretical & Applied Information Technology 75 (1), 2015
32015
AN ASSESSMENT ON THE PASSWORD PRACTICES AMONG STUDENTS.
MZ JALI, S ISMAIL, ZULH ABDULLAH
Journal of Theoretical & Applied Information Technology 66 (3), 2014
32014
8th National Health Seminar Digital Health: Stepping into The Future of Medicine
MA Masri, RF Jailani, L Azmi
Malaysian Journal of Public Health Medicine 22 (Suppl. 1), 2022
22022
Integrated-Regression and Whale Optimisation Algorithms to post stroke rehabilitation analysis: A case study for serious games
W Ismail, C Grosan, ZH Abdullah, AY Aldailamy, N Zainal, R Hendradi
2021 IEEE Symposium on Computers & Informatics (ISCI), 7-12, 2021
22021
A Survey of NewSQL DBMSs focusing on Taxonomy, Comparison and Open Issues
W Ismail, A Muhammed, ZH Abdullah, A Radman, R Hendradi, RR Afandi
Journal of Computer Science & Computational Mathematics, 87-95, 2021
22021
Issues and Challenges in Online Teaching and Learning during Movement Control Order (MCO)
S Ismail, HS Ariffin, ZH Abdullah
INTI Journal 2020, 2020
22020
Task mapping and routing optimization for hard real-time Networks-on-Chip
MNSM Sayuti, FHM Ridzuan, ZH Abdullah
Bulletin of Electrical Engineering and Informatics 8 (2), 414-421, 2019
22019
A study on the performances of danger theory and negative selection algorithms for mobile spam detection
NF Sulaiman, MZ Jali, ZH Abdullah, S Ismail
Advanced Science Letters 23 (5), 4586-4590, 2017
22017
系统目前无法执行此操作,请稍后再试。
文章 1–20