Showing 1 - 18 results of 18 for search 'Abdullah, Mohd. Taufik' Skip to content
  • Home
  • Feedback
  • Do Chuntas
  • Do Chuntas

    Ceanáin  Míreanna ar Iasacht  Ábhair ar Coimeád agus Athghlaoite  Fíneálacha Próifíl Do Chuardaigh Shabháilte
  • Logáil Amach
  • Logáil Isteach
  • Teanga
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
 
                                 Search: Ardroghanna
  • Údar
  • Abdullah, Mohd. Taufik
Showing 1 - 18 results of 18 for search 'Abdullah, Mohd. Taufik', am an iarratais: 0.03s Refine Results
1
Íomhá Chlúdaigh
Method of Event Reconstruction in Digital Investigation and its Visualization
le Abdullah, Mohd. Taufik
Foilsithe 2011
Faigh an téacs iomlán
Thesis
Cuir leis na Ceanáin
Saved in:
2
Íomhá Chlúdaigh
Method of Event Reconstruction in Digital Investigation and its Visualization
le Abdullah, Mohd. Taufik
Foilsithe 2011
Faigh an téacs iomlán
Thesis
Cuir leis na Ceanáin
Saved in:
3
Íomhá Chlúdaigh
IoTContact: a strategy for predicting contagious IoT nodes in mitigating ransomware attacks
le Ibrahim, Mohammed, Abdullah, Mohd Taufik, Abdullah, Azizol, Perumal, Thinagaran
Foilsithe 2021
Article
Cuir leis na Ceanáin
Saved in:
4
Íomhá Chlúdaigh
Bring your own device: security challenges and a theoretical framework for two-factor authentication
le Olalere, Morufu, Abdullah, Mohd Taufik, Mahmod, Ramlan, Abdullah, Azizol
Foilsithe 2016
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
5
Íomhá Chlúdaigh
A review of bring your own device on security issues
le Olalere, Morufu, Abdullah, Mohd Taufik, Mahmod, Ramlan, Abdullah, Azizol
Foilsithe 2015
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
6
Íomhá Chlúdaigh
Secure multi-authority attribute-based encryption with cache-aware scheduling for mobile cloud access control
le Jamal, Fara, Abdullah, Mohd Taufik, Mohd Hanapi, Zurina, Abdullah, Azizol
Foilsithe 2020
Article
Cuir leis na Ceanáin
Saved in:
7
Íomhá Chlúdaigh
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
le Jamal, Fara, Abdullah, Mohd Taufik, Mohd Hanapi, Zurina, Abdullah, Azizol
Foilsithe 2019
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
8
Íomhá Chlúdaigh
Formalization in digital forensic triage for identification of malicious IoT devices
le Ibrahim, Mohammed, Jasser, Muhammed Basheer, Abdullah, Mohd Taufik, Abdullah, Azizol
Foilsithe 2019
Article
Cuir leis na Ceanáin
Saved in:
9
Íomhá Chlúdaigh
Vehicular ad hoc networks and security issues: survey
le Abdulkader, Zaid A., Abdullah, Azizol, Abdullah, Mohd Taufik, Zukarnain, Zuriati Ahmad
Foilsithe 2017
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
10
Íomhá Chlúdaigh
E2IDS: an enhanced intelligent intrusion detection system based on decision tree algorithm
le Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik
Foilsithe 2022
Article
Cuir leis na Ceanáin
Saved in:
11
Íomhá Chlúdaigh
A survey of anomaly detection using data mining methods for hypertext transfer protocol web services
le Kakavand, Mohsen, Mustapha, Norwati, Mustapha, Aida, Abdullah, Mohd Taufik, Riahi, Hamed
Foilsithe 2015
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
12
Íomhá Chlúdaigh
New DNA based dynamical S-Box for block cipher
le Chng, Chern Wei, Md. Yasin, Sharifah, Abdullah, Mohd. Taufik, Udzir, Nur Izura
Foilsithe 2018
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
13
Íomhá Chlúdaigh
Wireless local area network: a comprehensive review of attacks and metrics
le Sarvari, Samira, Sani, Nor Fazlida Mohd, Hanapi, Zurina Mohd, Abdullah, Mohd Taufik
Foilsithe 2017
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
14
Íomhá Chlúdaigh
An intelligent DDoS attack detection tree-based model using Gini index feature selection method
le Bouke, Mohamed Aly, Abdullah, Azizol, ALshatebi, Sameer Hamoud, Abdullah, Mohd Taufik, Atigh, Hayate El
Foilsithe 2023
Article
Cuir leis na Ceanáin
Saved in:
15
Íomhá Chlúdaigh
Greening cloud-enabled big data storage forensics: syncany as a case study
le Teing, Yee-Yang, Dehghantanha, Ali, Choo, Kim-Kwang Raymond, Muda, Zaiton, Abdullah, Mohd Taufik
Foilsithe 2019
Article
Cuir leis na Ceanáin
Saved in:
16
Íomhá Chlúdaigh
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
le Ling, Yeong Tyng, Mohd Sani, Nor Fazlida, Abdullah, Mohd Taufik, Abdul Hamid, Nor Asilah Wati
Foilsithe 2021
Article
Cuir leis na Ceanáin
Saved in:
17
Íomhá Chlúdaigh
Structural features with nonnegative matrix factorization for metamorphic malware detection
le Yeong, Tyng Ling, Mohd Sani, Nor Fazlida, Abdullah, Mohd. Taufik, Abdul Hamid, Nor Asilah Wati
Foilsithe 2021
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
18
Íomhá Chlúdaigh
Nonnegative matrix factorization and metamorphic malware detection
le Ling, Yeong Tyng, Mohd Sani, Nor Fazlida, Abdullah, Mohd Taufik, Abdul Hamid, Nor Asilah Wati
Foilsithe 2019
Faigh an téacs iomlán
Article
Cuir leis na Ceanáin
Saved in:
Uirlisí Cuardaigh: Faigh Fotha RSS — Seol an Cuardach seo mar Ríomhphost —

 Contact Us
 Quick Links
 
PERPUSTAKAAN SULTAN ABDUL SAMAD

Universiti Putra Malaysia

43400 UPM Serdang

Selangor Darul Ehsan

Phone: +603 9769 8642
Fax    : +603 9769 4747
Email : lib@upm.edu.my
 
 
  • UPM Library Portal
  • UPM Web OPAC
  • UPM IR
  • UPM MyAGRIC
  • UPM EZACCESS
  • Web AGRIS
 

Á lódáil...