Norziana Jamil
Cited by
Cited by
An improved indoor positioning algorithm based on rssi-trilateration technique for internet of things (iot)
ME Rusli, M Ali, N Jamil, MM Din
2016 International Conference on Computer and Communication Engineering …, 2016
A survey of SCADA testbed implementation approaches
Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ...
Indian Journal of Science and Technology 10 (26), 1-8, 2017
Construction of cryptographically strong S-boxes inspired by bee waggle dance
H Isa, N Jamil, MR Z’aba
New generation computing 34 (3), 221-238, 2016
Threat modeling approaches for securing cloud computin
A Amini, N Jamil, AR Ahmad, MR Zaba
Journal of Applied Sciences 15 (7), 953-967, 2015
Information security governance model to enhance zakat information management in Malaysian zakat institutions
H Sulaiman, N Jamil
Proceedings of the 6th International Conference on Information Technology …, 2014
I-PRESENTTM: An Involutive Lightweight Block Cipher
MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir
Journal of Information Security 2014, 2014
Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networks
BA Muzakkari, MA Mohamed, MFA Kadir, Z Mohamad, N Jamil
International Journal of Advanced Computer Research 8 (38), 212-228, 2018
A review of security assessment methodologies in industrial control systems
QS Qassim, N Jamil, M Daud, A Patel, N Ja’affar
Information & Computer Security, 2019
A survey of lightweight cryptographic hash function
BT Hammad, N Jamil, ME Rusli, M Reza
Inter. J. Sci. Eng. Res 8, 806-814, 2017
S-box construction from non-permutation power functions
H Isa, N Jamil, MR Z'aba
Proceedings of the 6th International Conference on Security of Information …, 2013
A new cryptographic hash function based on cellular automata rules 30, 134 and omega-flip network
N Jamil, R Mahmood, R Muhammad
ICICN 2012 27, 163-169, 2012
Implementation of PRINCE algorithm in FPGA
YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq
Proceedings of the 6th International Conference on Information Technology …, 2014
Indoor positioning: technology comparison analysis
MM Din, N Jamil, J Maniam, MA Mohamed
International Journal of Engineering & Technology 7 (2.14), 133-137, 2018
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: Multi-key generation
FAA El-Orany, MRB Wahiddin, MA Mat-Nor, N Jamil, I Bahari
Laser physics 20 (5), 1210-1214, 2010
A comprehensive review of existing risk assessment models in cloud computing
A Amini, N Jamil
Journal of Physics: Conference Series 1018 (1), 012004, 2018
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
QS Qassim, N Jamil, M Daud, N Ja’affar, S Yussof, R Ismail, ...
International Journal of Engineering & Technology 7 (2.14), 153-159, 2018
Hybrid heuristic methods in constructing cryptographically strong S-boxes
H Isa, N Jamil, M Z’aba
Int. J. Cryptol. Res 6 (1), 1-15, 2016
A fuzzy logic based risk assessment approach for evaluating and prioritizing risks in cloud computing environment
A Amini, N Jamil, AR Ahmad, H Sulaiman
International Conference of Reliable Information and Communication …, 2017
IoT honeypot: A review from researcher's perspective
MF Razali, MN Razali, FZ Mansor, G Muruti, N Jamil
2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018
BT Hammad, N Jamil, ME Rusli, MR Z'ABA, IT Ahmed
Journal of Theoretical & Applied Information Technology 95 (19), 2017
The system can't perform the operation now. Try again later.
Articles 1–20