[PDF][PDF] Establishing a soldier wireless sensor network (WSN) communication for military operation monitoring

MN Ismail, MA Shukran, MRM Isa, M Adib… - Int. J. Inf. Commun …, 2018 - academia.edu
The study investigates and develops components for implementing an effective and efficient
military knowledge/information/communication in closed network architecture. Since military …

Establishing mesh network amongst infantry personnel during military operations: A preliminary study

AKA Ghani, MN Ismail, Z Omar… - … on Information and …, 2016 - ieeexplore.ieee.org
This paper describes a preliminary study for proposing a viable mesh network
communication for knowledge sharing platform. This network structure is to support military …

[PDF][PDF] Security Model to Control on Social Media using Visualization and Forensic Approach

KL Besi - academia.edu
Nowadays, alternative media especially social media has played an important role in
influencing people on any issues. If there is no controls on social media contents such as …

[PDF][PDF] A New Approach in Securing Cloud Network from Malware Attack

KL Besi - academia.edu
Malware includes network viruses, worms, Trojan horses, rootkits, spyware, adware,
malicious BHOs, rogue security software and other malicious programs. Malware infections …

[引用][C] IT competency and firm performance: Mediating effects of knowledge management strategy and dynamic capabilities

J You, Y Li - Journal of Convergence Information …, 2013 - Advanced Institute of Convergence …

[引用][C] Business-Process-Context-based Knowledge Access Control Model for E-Maintenance

J Guo, D Yu - Advances in Information Sciences …, 2012 - The International Association for …

[引用][C] Optimization Design Model for Extraction Process of Rutin from Sophora Japonica

J Zhou, R An, H Zhang, Y Liu - Journal of …, 2012 - Advanced Institute of Convergence …

[引用][C] Web Typography for Responsive Web Design

LF Yee, MA bin Mohd Shukran… - Advances in …, 2015 - Advanced Institutes of Convergence …

[引用][C] A New Approach in Securing Cloud Network from Malware Attack

MNB Ismail, MABM Shukran… - Advances in …, 2015 - Advanced Institutes of Convergence …

[引用][C] Security Model to Control on Social Media using Visualization and Forensic Approach

MNB Ismail, MABM Shukran… - Advances in …, 2015 - Advanced Institutes of Convergence …