System architecture for SQL injection and insider misuse detection system for DBMS A Asmawi, ZM Sidek, S Abd Razak 2008 International Symposium on Information Technology 4, 1-6, 2008 | 26 | 2008 |
A comparative analysis of Arabic text steganography R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan, R Din Applied Sciences 11 (15), 6851, 2021 | 20 | 2021 |
CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data R Thabit, NI Udzir, SM Yasin, A Asmawi, AAA Gutub IEEE Access 10, 65439-65458, 2022 | 18 | 2022 |
Model-based system architecture for preventing XPath injection in database-centric web services environment A Asmawi, LS Affendey, NI Udzir, R Mahmod 2012 7th International Conference on Computing and Convergence Technology …, 2012 | 9 | 2012 |
Vulnerabilities detection using attack recognition technique in multi-factor authentication NAM Ariffin, FA Rahim, A Asmawi, ZA Ibrahim TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (4 …, 2020 | 7 | 2020 |
A dynamic malware detection in cloud platform NLY Fui, A Asmawi, M Hussin International Journal of Difference Equations (IJDE) 15 (2), 243-258, 2020 | 5 | 2020 |
Digital forensics investigation reduction model (DIFReM) framework for Windows 10 OS YH Shayau, A Asmawi, SNM Rum, NAM Ariffin 2019 IEEE 9th International Conference on System Engineering and Technology …, 2019 | 4 | 2019 |
System architecture for SQL injection and insider misuse detection system A Asmawi, ZM Sidek, SA Razak IEEE Conference, 2008 | 3 | 2008 |
XTrust: A Severity-Aware Trust-Based Access Control for Enhancing Security Level of Xml Database from Insider Threats A Asmawi, LS Affendey, NI Udzir, R Mahmod PalArch's Journal of Archaeology of Egypt/Egyptology 18 (3), 444-450, 2021 | 2 | 2021 |
Smart-Contract Privacy Preservation Mechanism M Siraj, MIH Ninggal, NI Udzir, MDH Abdullah, A Asmawi EAI Endorsed Transactions on Scalable Information Systems 10 (6), 2023 | 1 | 2023 |
SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud M Siraj, M Ninggal, IH Hj, NI Udzir, MDH Abdullah, A Asmawi arXiv preprint arXiv:2004.02543, 2020 | 1 | 2020 |
A Survey on Artificial Immune System-Based Intrusion Detection System for DBMS A Asmawi, ZM Sidek Postgraduate Annual Research Seminar, 2007 | 1 | 2007 |
Development of BlockScholar as an Educational Mobile Application on Blockchain Technology A Asmawi, EM Saifulbahri, NAM Ariffin Journal of Advanced Research in Applied Sciences and Engineering Technology …, 2024 | | 2024 |
WBEC: A WEB BROWSERS EVIDENCE COLLECTION TOOLKIT FOR WEB BROWSERS USAGE IN WINDOWS 10 DM Rayman, A Asmawi, NAM Ariffin International Journal of Technology Management and Information System 4 (1 …, 2022 | | 2022 |
XTRUST: A SEVERITY-AWARE TRUST-BASED ACCESS CONTROL FOR ENHANCING SECURITY LEVEL OF XML DATABASE FROM INSIDER THREATS L SurianiAffendey PalArch's Journal of Archaeology of Egypt/Egyptology 18 (3), 4121-4128, 2021 | | 2021 |
Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control A Asmawi, LS Affendey, NI Udzir, R Mahmod International Journal of Computer and Information Engineering 8 (6), 961-963, 2014 | | 2014 |
XIPS: A Model-based Prevention Mechanism for Preventing Blind XPath Injection in Database-Centric Web Services Environment A Asmawi, LS Affendey, NI Udzir, R Mahmod International Journal of Advancements in Computing Technology (IJACT) 5 (10), 69, 2013 | | 2013 |
Blind Xpath Injection Prevention System (BXIPS): An Education Tool for Computer Science Undergraduate Students Toward Secure Coding Practices in Web Services Development Course A Asmawi, LS Affendey, NI Udzir, R Mahmod | | 2013 |
Hybrid Detection Technique for Databases Intrusion Using SQL Injection and Insider Misuse Data A Asmawi Universiti Teknologi Malaysia, 2010 | | 2010 |
TWO LEVEL SECURITY APPROACHES FOR SECURE XML DATABASE CENTRIC WEB SERVICES AGAINST XPATH INJECTIONS A ASMAWI | | |