Follow
Norziana Jamil
Title
Cited by
Cited by
Year
An improved indoor positioning algorithm based on rssi-trilateration technique for internet of things (iot)
ME Rusli, M Ali, N Jamil, MM Din
2016 international conference on computer and communication engineering …, 2016
1592016
Blockchain consensus: An overview of alternative protocols
DP Oyinloye, JS Teh, N Jamil, M Alawida
Symmetry 13 (8), 1363, 2021
1002021
A survey of scada testbed implementation approaches
Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ...
Indian Journal of Science and Technology, 2017
532017
Construction of cryptographically strong S-boxes inspired by bee waggle dance
H Isa, N Jamil, MR Z’aba
New generation computing 34, 221-238, 2016
432016
A review of security assessment methodologies in industrial control systems
QS Qassim, N Jamil, M Daud, A Patel, N Ja’affar
Information & Computer Security 27 (1), 47-61, 2019
412019
Threat modeling approaches for securing cloud computin
A Amini, N Jamil, AR Ahmad, MR Zaba
Journal of Applied Sciences 15 (7), 953-967, 2015
372015
Differential cryptanalysis of WARP
JS Teh, A Biryukov
Journal of Information Security and Applications 70, 103316, 2022
34*2022
A survey of lightweight cryptographic hash function
BT Hammad, N Jamil, ME Rusli, MR Z’aba
Inter. J. Sci. Eng. Res 8, 806-814, 2017
322017
Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networks
BA Muzakkari, MA Mohamed, MFA Kadir, Z Mohamad, N Jamil
International Journal of Advanced Computer Research 8 (38), 212-228, 2018
302018
Cybersecurity of microgrid: state-of-the-art review and possible directions of future research
N Jamil, QS Qassim, FA Bohani, M Mansor, VK Ramachandaramurthy
Applied Sciences 11 (21), 9812, 2021
282021
I-PRESENTTM: An Involutive Lightweight Block Cipher
MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir
Journal of Information Security 2014, 2014
262014
IoT honeypot: A review from researcher's perspective
MF Razali, MN Razali, FZ Mansor, G Muruti, N Jamil
2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018
242018
Implementation of PRINCE algorithm in FPGA
YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq
Proceedings of the 6th International Conference on Information Technology …, 2014
242014
Information security governance model to enhance zakat information management in Malaysian zakat institutions
H Sulaiman, N Jamil
Proceedings of the 6th International Conference on Information Technology …, 2014
242014
A comparative review on symmetric and asymmetric DNA-based cryptography
BT Hammad, AM Sagheer, IT Ahmed, N Jamil
Bulletin of Electrical Engineering and Informatics 9 (6), 2484-2491, 2020
232020
Image copy-move forgery detection algorithms based on spatial feature domain
IT Ahmed, BT Hammad, N Jamil
2021 IEEE 17th International colloquium on signal processing & its …, 2021
202021
Determinants of cloud computing integration and its impact on sustainable performance in SMEs: An empirical investigation using the SEM-ANN approach
MA Al-Sharafi, M Iranmanesh, M Al-Emran, AI Alzahrani, F Herzallah, ...
Heliyon 9 (5), 2023
192023
Lightweight block cipher security evaluation based on machine learning classifiers and active S-boxes
TR Lee, JS Teh, N Jamil, JLS Yan, J Chen
IEEE Access 9, 134052-134064, 2021
192021
Authenticated encryption schemes: A systematic review
MA Jimale, MR Z’aba, MLBM Kiah, MYI Idris, N Jamil, MS Mohamad, ...
IEEE Access 10, 14739-14766, 2022
182022
Improve of contrast-distorted image quality assessment based on convolutional neural networks.
IT Ahmed, CS Der, N Jamil, MA Mohamed
International Journal of Electrical & Computer Engineering (2088-8708) 9 (6), 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20