Showing
1 - 17
results of
17
for search '
Abdullah, Mohd Taufik
'
Skip to content
Toggle navigation
Home
Feedback
Your Account
Back
Your Account
Saved Items
Checked Out Items
Holds and Recalls
Fines
Profile
Saved Searches
Log Out
Login
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Search:
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Tag
Find
Advanced
Author
Abdullah, Mohd Taufik
Showing
1 - 17
results of
17
for search '
Abdullah, Mohd Taufik
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
Select Page | with selected:
Email
Export
Print
Save
Select result number 1
1
Method of Event Reconstruction in Digital Investigation and its Visualization
by
Abdullah
,
Mohd
.
Taufik
Published 2011
View full text
Thesis
Save to List
Saved in:
Select result number 2
2
Method of Event Reconstruction in Digital Investigation and its Visualization
by
Abdullah
,
Mohd
.
Taufik
Published 2011
View full text
Thesis
Save to List
Saved in:
Select result number 3
3
Bring your own device: security challenges and a theoretical framework for two-factor authentication
by
Olalere, Morufu
,
Abdullah
,
Mohd
Taufik
,
Mahmod, Ramlan
,
Abdullah, Azizol
Published 2016
View full text
Article
Save to List
Saved in:
Select result number 4
4
A review of bring your own device on security issues
by
Olalere, Morufu
,
Abdullah
,
Mohd
Taufik
,
Mahmod, Ramlan
,
Abdullah, Azizol
Published 2015
View full text
Article
Save to List
Saved in:
Select result number 5
5
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks
by
Ibrahim, Mohammed
,
Abdullah
,
Mohd
Taufik
,
Abdullah, Azizol
,
Perumal, Thinagaran
Published 2021
Article
Save to List
Saved in:
Select result number 6
6
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
by
Jamal, Fara
,
Abdullah
,
Mohd
Taufik
,
Mohd Hanapi, Zurina
,
Abdullah, Azizol
Published 2019
View full text
Article
Save to List
Saved in:
Select result number 7
7
Formalization in digital forensic triage for identification of malicious IoT devices
by
Ibrahim, Mohammed
,
Jasser, Muhammed Basheer
,
Abdullah
,
Mohd
Taufik
,
Abdullah, Azizol
Published 2019
Article
Save to List
Saved in:
Select result number 8
8
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
by
Jamal, Fara
,
Abdullah
,
Mohd
Taufik
,
Mohd Hanapi, Zurina
,
Abdullah, Azizol
Published 2020
Article
Save to List
Saved in:
Select result number 9
9
Vehicular ad hoc networks and security issues: survey
by
Abdulkader, Zaid A.
,
Abdullah, Azizol
,
Abdullah
,
Mohd
Taufik
,
Zukarnain, Zuriati Ahmad
Published 2017
View full text
Article
Save to List
Saved in:
Select result number 10
10
A survey of anomaly detection using data mining methods for hypertext transfer protocol web services
by
Kakavand, Mohsen
,
Mustapha, Norwati
,
Mustapha, Aida
,
Abdullah
,
Mohd
Taufik
,
Riahi, Hamed
Published 2015
View full text
Article
Save to List
Saved in:
Select result number 11
11
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
by
Bouke, Mohamed Aly
,
Abdullah, Azizol
,
ALshatebi, Sameer Hamoud
,
Abdullah
,
Mohd
Taufik
Published 2022
Article
Save to List
Saved in:
Select result number 12
12
Wireless local area network: a comprehensive review of attacks and metrics
by
Sarvari, Samira
,
Sani, Nor Fazlida Mohd
,
Hanapi, Zurina Mohd
,
Abdullah
,
Mohd
Taufik
Published 2017
View full text
Article
Save to List
Saved in:
Select result number 13
13
New DNA based dynamical S-Box for block cipher
by
Chng, Chern Wei
,
Md. Yasin, Sharifah
,
Abdullah
,
Mohd
.
Taufik
,
Udzir, Nur Izura
Published 2018
View full text
Article
Save to List
Saved in:
Select result number 14
14
Greening cloud-enabled big data storage forensics: syncany as a case study
by
Teing, Yee-Yang
,
Dehghantanha, Ali
,
Choo, Kim-Kwang Raymond
,
Muda, Zaiton
,
Abdullah
,
Mohd
Taufik
Published 2019
Article
Save to List
Saved in:
Select result number 15
15
Nonnegative matrix factorization and metamorphic malware detection
by
Ling, Yeong Tyng
,
Mohd Sani, Nor Fazlida
,
Abdullah
,
Mohd
Taufik
,
Abdul Hamid, Nor Asilah Wati
Published 2019
View full text
Article
Save to List
Saved in:
Select result number 16
16
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
by
Ling, Yeong Tyng
,
Mohd Sani, Nor Fazlida
,
Abdullah
,
Mohd
Taufik
,
Abdul Hamid, Nor Asilah Wati
Published 2021
Article
Save to List
Saved in:
Select result number 17
17
Structural features with nonnegative matrix factorization for metamorphic malware detection
by
Yeong, Tyng Ling
,
Mohd Sani, Nor Fazlida
,
Abdullah
,
Mohd
.
Taufik
,
Abdul Hamid, Nor Asilah Wati
Published 2021
View full text
Article
Save to List
Saved in:
Select Page | with selected:
Email
Export
Print
Save
Search Tools:
Get RSS Feed
—
Email this Search
—
×
Loading...