Mohd Fairuz Iskandar Othman
Cited by
Cited by
Barriers to Information Technology Governance Adoption: A Preliminary Empirical Investigation
MFI Othman, T Chan, E Foo, KJ Nelson, GT Timbrell
15th International Business Information Management Association Conference …, 2011
Barriers to Formal IT Governance Practice--Insights from a Qualitative Study
MFI Othman, T Chan
46th Hawaii International Conference on System Sciences (HICSS), 4415-4424, 2013
Advanced Computer and Communication Engineering Technology: Proceedings of ICOCOE 2015
Springer 362, 1325, 2016
What is the influence of users’ characteristics on their ability to detect phishing emails?
I Alseadoon, MFI Othman, T Chan
Advanced computer and communication engineering technology, 949-962, 2015
Clustering methods for cluster-based routing protocols in wireless sensor networks: Comparative study
AA Hassan, WM Shah, MF Iskandar, AAJ Mohammed
Int. J. Appl. Eng. Res 12 (21), 11350-11360, 2017
Evaluate the performance of K-Means and the fuzzy C-Means algorithms to formation balanced clusters in wireless sensor networks.
AA Hassan, WM Shah, MFI Othman, HAH Hassan
International Journal of Electrical & Computer Engineering (2088-8708) 10 (2), 2020
Revealing the Influence of Feature Selection for Fast Attack Detection
MF Abdollah, AH Yaacob, S Sahib, I Mohamad, MFI Othman
IJCSNS International Journal of Computer Science and Network Security 8, 107-115, 2008
DNS Tunneling: a Review on Features
M Sammour, B Hussin, MFI Othman, M Doheir, B AlShaikhdeeb, MS Talib
International Journal of Engineering and Technology 7 (3.20), 1-5, 2018
IT Governance Adoption in Malaysia: A Preliminary Investigation
MFI Othman, T Chan, E Foo
22nd Australasian Conference on Information Systems (ACIS), 1-10, 2011
Clustering Approach in Wireless Sensor Networks Based on K-means: limitations and Recommendations
MFIO Ali Abdul-hussian Hassan, WahidahMd Shah, Ali Mohamed Husien, Mohammed ...
International Journal of Recent Technology and Engineering (IJRTE) 7 (6S5 …, 2019
Comparative Analysis for Detecting DNS Tunneling Using Machine Learning Techniques
M Sammour, B Hussin, FI Othman
International Journal of Applied Engineering Research 12 (22), 12762-12766, 2017
Typology of Phishing Email Victims Based on their Behavioural Response
IM Alseadoon, MFI Othman, E Foo, T Chan
19th Americas Conference on Information Systems (AMCIS), 19, 2013
An improved energy-efficient clustering protocol to prolong the lifetime of the WSN-based IoT
AAH Hassan, WM Shah, AHH Habeb, MFI Othman, MN Al-Mhiqani
IEEE Access 8, 200500-200517, 2020
Unequal clustering routing algorithms in wireless sensor networks: A comparative study
AA Hassan, WM Shah, MF Iskandar, MN Al-Mhiqani, ZK Naseer
J. Adv. Res. Dyn. Control Syst 10 (2), 2142-2156, 2018
Barriers to the Adoption of Formal IT Governance Practice: A Malaysian Case
MFI Othman
Queensland University of Technology, 2016
Vehicle detection and tracking system IoT based: a review
MF Alrifaie, N Harum, MOI Fairuz, I Roslan, MA Shyaa
Int. Res. J. Eng. Technol, 1237-1241, 2018
K Nearest Neighbor Joins and Mapreduce Process Enforcement for the Cluster of Data Sets in Bigdata
AA Hassan, W Md Shah, MFI Othman, MS Talib, AAJ Mohammed
Journal of Advanced Research in Dynamical and Control Systems (JARDCS), 690-696, 2018
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
M Zulkiflee, MA Faizal, MFI Othman, AN Azman, S Shahrin
International Journal of Computer Science and Information Security (IJCSIS …, 2011
High speed internet development in Africa using 4G-LTE technology-a review
M Njikam, S Nanna, S Shahrin, MFI Othman
Bulletin of Electrical Engineering and Informatics 8 (2), 577-585, 2019
Using analytical hierarchy process (AHP) to evaluate barriers in adopting formal IT governance practices
MFI Othman, NC Pee, YA Rahim, HA Sulaiman, MA Othman, MZAA Aziz
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20