Machine learning for cloud DDoS attack detection: a systematic review AM Makkawi, A Yousif 2020 International conference on computer, control, electrical, and …, 2021 | 10 | 2021 |
Design and Development of a Web-Based System using Laravel Framework: A Competition Management System NZAZ Azran, N Wahid Applied Information Technology And Computer Science 3 (2), 514-532, 2022 | 6 | 2022 |
COVID-19 phishing detection based on hyperlink using k-nearest neighbor (KNN) algorithm NA Afandi, IRA Hamid Applied Information Technology And Computer Science 2 (2), 287-301, 2021 | 6 | 2021 |
Hotel reservation management system WS Koh, YMM Hassim Applied Information Technology And Computer Science 2 (2), 973-992, 2021 | 5 | 2021 |
Bright Kids Tuition Centre Management Information System WC Chai, SA Mostafa Applied Information Technology And Computer Science 2 (2), 937-957, 2021 | 5 | 2021 |
Comparison of Convolutional Neural Network and Artificial Neural Network for Android Botnet Attack Detection S Balasunthar, Z Abdullah Applied Information Technology And Computer Science 3 (2), 32-49, 2022 | 4 | 2022 |
Design and development of online hostel management system to improve application and management process PL Wong, H Mahdin Applied Information Technology And Computer Science 3 (2), 356-369, 2022 | 3 | 2022 |
The Development of an Online Food Ordering System for JomMakan Restaurant MH Azahari, FAH Ali Applied Information Technology and Computer Science 3 (1), 369-376, 2022 | 3 | 2022 |
Aplikasi Pengurusan Fazira Car Wash Menggunakan Android (Fazira2Clean) AM Othman, AA Ramli Applied Information Technology And Computer Science 2 (2), 1046-1061, 2021 | 3 | 2021 |
UTHM Students' Event Management System PAASU Azmi, N Ibrahim Applied Information Technology And Computer Science 2 (2), 697-716, 2021 | 3 | 2021 |
Augmented Reality (AR) Solar System Learning Application KH Koh, EFA Shaubari Applied Information Technology And Computer Science 2 (2), 541-556, 2021 | 3 | 2021 |
Electronic medical record system using ethereum blockchain and role-based access control CM Loh, CW Chuah Applied Information Technology And Computer Science 2 (2), 53-72, 2021 | 3 | 2021 |
An Improved Iris Segmentation using Pupil Candidate Bank for Non-Cooperative Iris Recognition NURHM KAMIL, NABM Zin Applied Information Technology And Computer Science 4 (1), 1281-1295, 2023 | 2 | 2023 |
Care Foundation Electronic Medical Record System Cryptographic-Based Approach and Role-Based Access Control XH Khoo, SNB Ramli Applied Information Technology And Computer Science 4 (1), 059-078, 2023 | 2 | 2023 |
Design and Development of Pet Cage Ordering System on Web Based Technology AA Chia, H Mahdin, MS Arshad Applied Information Technology And Computer Science 3 (2), 257-275, 2022 | 2 | 2022 |
A Comparative Study of SQL Injection Detection Using Machine Learning Approach FDM Dass, CFM Foozy Applied Information Technology And Computer Science 3 (2), 19-31, 2022 | 2 | 2022 |
AR Makeup Tester: Design and Development of Augmented Reality based on Makeup Tester to support Product Testing T Chandran, F Othman Applied Information Technology And Computer Science 3 (1), 19-32, 2022 | 2 | 2022 |
Sales and Inventory System for Maperow Store AI Azmi Applied Information Technology And Computer Science 3 (1), 849-867, 2022 | 2 | 2022 |
A Development of a Mobile Application for Baby Food Journey NF Alias, S Marjudi Applied Information Technology and Computer Science 3 (1), 599-611, 2022 | 2 | 2022 |
Student Management System Development of Damya Deena Tuition Center (SPP Damya Deena) RAY Mohd, AA Ramli Applied Information Technology and Computer Science 3 (1), 889-901, 2022 | 2 | 2022 |