Ikuti
Kamarularifin Abd Jalil (Ass. Prof. Dr.)
Kamarularifin Abd Jalil (Ass. Prof. Dr.)
Email yang diverifikasi di tmsk.uitm.edu.my
Judul
Dikutip oleh
Dikutip oleh
Tahun
The definition and characteristics of ubiquitous learning: A discussion
S Yahya, E Ahmad, K Abd Jalil
International Journal of Education and Development using ICT 6 (1), 2010
4462010
Comparison of machine learning algorithms performance in detecting network intrusion
K Abd Jalil, MH Kamarudin, MN Masrek
2010 international conference on networking and information technology, 221-226, 2010
962010
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
G Buja, KB Abd Jalil, FBHM Ali, TFA Rahman
2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014
442014
A method for web application vulnerabilities detection by using Boyer-Moore string matching algorithm
AZM Saleh, NA Rozali, AG Buja, KA Jalil, FHM Ali, TFA Rahman
Procedia Computer Science 72, 112-121, 2015
372015
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks
FBM Nor, K Abd Jalil
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
302012
Securing routing table update in AODV routing protocol
K Abd Jalil, Z Ahmad, JL Ab Manan
2011 IEEE Conference on Open Systems, 116-121, 2011
302011
Mitigation of black hole attacks for aodv routing protocol
KA Jali, Z Ahmad, JL Ab Manan
International Journal of New Computer Architectures and their Applications …, 2011
242011
SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm.
TFA Rahman, AG Buja, K Abd, FM Ali
J. Comput. 12 (2), 183-189, 2017
192017
Latif, Mohamad Noorman Masrek,“Looking Into The 4G Features”
K Abd Jalil, MH Abd
MASAUM Journal of Basic and Applied Sciences 1 (2), 249-253, 2009
192009
Achieving trust in cloud computing using secure data provenance
MIM Saad, K Abd Jalil, M Manaf
2014 IEEE Conference on Open Systems (ICOS), 84-88, 2014
152014
Black hole effect mitigation method in AODV routing protocol
Z Ahmad, KA Jalil
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
152011
Data provenance trusted model in cloud computing
MIM Saad, K Abd Jalil, M Manaf
2013 International Conference on Research and Innovation in Information …, 2013
122013
Performance evaluation on modified AODV protocols
Z Ahmad, K Abd Jalil
2012 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE), 158-163, 2012
92012
Fault Tolerance Mechanism for Software Application Through Fog Computing as Middleware
MH Naim, JM Zain, K Abd Jalil
International Journal of Computing and Digital Systems 11 (1), 45-54, 2022
62022
Mitigating man-in-the-browser attacks with hardware-based authentication scheme
FBM Nor, K Abd Jalil
International Journal of Cyber-Security and Digital Forensics 1 (3), 204-211, 2012
62012
An enhanced route discovery mechanism for aodv routing protocol
KA Jalil, Z Ahmad, JLA Manan
Software Engineering and Computer Systems: Second International Conference …, 2011
62011
Mind mapping with cooperative learning in supplementing computer programming learning: theoretical framework
MN Ismail, KA Jalil
MASAUM Journal of Basic and Applied Sciences 1 (3), 497-504, 2009
52009
The embedding of Arabic characters in QR code
MFI Kamil, K Abd Jalil
2012 IEEE Conference on Open Systems, 1-5, 2012
32012
Authenticating devices in ubiquitous computing environment
K Abd Jalil, QBA Rahman
International Journal of Cyber-Security and Digital Forensics 1 (2), 75-82, 2012
32012
Remote user authentication scheme with hardware-based attestation
FB Mat Nor, K Abd Jalil, J Ab Manan
Software Engineering and Computer Systems: Second International Conference …, 2011
32011
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–20