Halal certification for tourism marketing: the attributes and attitudes of food operators in Indonesia N Katuk, KR Ku-Mahamud, K Kayat, MN Abdul Hamid, NH Zakaria, ... Journal of Islamic Marketing 12 (5), 1043-1062, 2021 | 98 | 2021 |
Hybrid machine learning technique for intrusion detection system H Mohamad Tahir, W Hasan, A Md Said, NH Zakaria, N Katuk, NF Kabir, ... | 62 | 2015 |
Experience beyond knowledge: Pragmatic e-learning systems design with learning experience N Katuk, J Kim, H Ryu Computers in Human Behavior 29 (3), 747-758, 2013 | 55 | 2013 |
Web‐based support system for flood response operation in Malaysia N Katuk, KR Ku‐Mahamud, N Norwawi, S Deris Disaster Prevention and Management: An International Journal 18 (3), 327-337, 2009 | 45 | 2009 |
Oving K-means clustering using discretization technique in network intrusion detection system HM Tahir, AM Said, NH Osman, NH Zakaria, PNAM Sabri, N Katuk 2016 3rd International Conference on Computer and Information Sciences …, 2016 | 29 | 2016 |
The application of blockchain for halal product assurance: A systematic review of the current developments and future directions N Katuk International Journal of Advanced Trends in Computer Science and Engineering …, 2019 | 28 | 2019 |
Implementation and recent progress in cloud-based smart home automation systems N Katuk, KR Ku-Mahamud, NH Zakaria, MA Maarof 2018 IEEE Symposium on Computer Applications & Industrial Electronics …, 2018 | 28 | 2018 |
A multiple attribute decision making for improving information security control assessment N Al-Safwani, S Hassan, N Katuk International Journal of Computer Applications 89 (3), 19-24, 2014 | 25 | 2014 |
Flood pattern detection using sliding window technique KR Ku-Mahamud, N Zakaria, N Katuk, M Shbier 2009 Third Asia International Conference on Modelling & Simulation, 45-50, 2009 | 23 | 2009 |
To click or not to click the link: the factors influencing internet banking users’ intention in responding to phishing emails S Manoharan, N Katuk, S Hassan, R Ahmad Information & Computer Security 30 (1), 37-62, 2022 | 20 | 2022 |
Biometric fingerprint architecture for home security system A Siswanto, N Katuk, KR Ku-Mahamud | 19 | 2016 |
Assessing personality types preferences amongst software developers: a case of Malaysia M Omar, N Katuk, SL Syed Abdullah, NL Hashim, R Romli ARPN Journal of Engineering and Applied Sciences 10 (3), 1499-1504, 2015 | 18 | 2015 |
Defining skill sets requirements for Agile Scrum team formation M Omar, NL Ahmad Khasasi, SL Syed Abdullah, NL Hashim, R Romli, ... Journal of Engineering and Applied Sciences 13 (3), 784-789, 2018 | 17 | 2018 |
Mobile phone sensing using the built-in camera N Katuk, N Zakaria, KR Ku-Mahamud International Association of Online Engineering, 2019 | 16 | 2019 |
Progressive assessment of student engagement with web‐based guided learning N Katuk Interactive Technology and Smart Education 10 (2), 116-129, 2013 | 16 | 2013 |
Does a longer usage mean flow experience? An evaluation of learning experience with curriculum sequencing systems (CSS) N Katuk, H Ryu 2011 Sixth IEEE international symposium on electronic design, test and …, 2011 | 15 | 2011 |
On multi attribute decision making methods: Prioritizing information security controls N AL-Safwani, S Hassan, N Katuk Journal of Applied Sciences Research 14 (16), 1865-1870, 2014 | 14 | 2014 |
Finding an optimal learning path in dynamic curriculum sequencing with flow experience N Katuk, H Ryu 2010 International Conference on Computer Applications and Industrial …, 2010 | 13 | 2010 |
A scoping study on lightweight cryptography reviews in IoT IR Chiadighikaobi, N Katuk Baghdad Science Journal 18 (2 (Suppl.)), 0989-0989, 2021 | 12 | 2021 |
A usability study of social media credentials as a single-sign-on mechanism: Student access to online teaching materials KL Chun, N Katuk Journal of Industrial and Intelligent Information 2 (3), 2014 | 12 | 2014 |