Follow
Aziah Asmawi
Title
Cited by
Cited by
Year
System architecture for SQL injection and insider misuse detection system for DBMS
A Asmawi, ZM Sidek, S Abd Razak
2008 International Symposium on Information Technology 4, 1-6, 2008
262008
A comparative analysis of Arabic text steganography
R Thabit, NI Udzir, SM Yasin, A Asmawi, NA Roslan, R Din
Applied Sciences 11 (15), 6851, 2021
202021
CSNTSteg: Color spacing normalization text steganography model to improve capacity and invisibility of hidden data
R Thabit, NI Udzir, SM Yasin, A Asmawi, AAA Gutub
IEEE Access 10, 65439-65458, 2022
182022
Model-based system architecture for preventing XPath injection in database-centric web services environment
A Asmawi, LS Affendey, NI Udzir, R Mahmod
2012 7th International Conference on Computing and Convergence Technology …, 2012
92012
Vulnerabilities detection using attack recognition technique in multi-factor authentication
NAM Ariffin, FA Rahim, A Asmawi, ZA Ibrahim
TELKOMNIKA (Telecommunication Computing Electronics and Control) 18 (4 …, 2020
72020
A dynamic malware detection in cloud platform
NLY Fui, A Asmawi, M Hussin
International Journal of Difference Equations (IJDE) 15 (2), 243-258, 2020
52020
Digital forensics investigation reduction model (DIFReM) framework for Windows 10 OS
YH Shayau, A Asmawi, SNM Rum, NAM Ariffin
2019 IEEE 9th International Conference on System Engineering and Technology …, 2019
42019
System architecture for SQL injection and insider misuse detection system
A Asmawi, ZM Sidek, SA Razak
IEEE Conference, 2008
32008
XTrust: A Severity-Aware Trust-Based Access Control for Enhancing Security Level of Xml Database from Insider Threats
A Asmawi, LS Affendey, NI Udzir, R Mahmod
PalArch's Journal of Archaeology of Egypt/Egyptology 18 (3), 444-450, 2021
22021
Smart-Contract Privacy Preservation Mechanism
M Siraj, MIH Ninggal, NI Udzir, MDH Abdullah, A Asmawi
EAI Endorsed Transactions on Scalable Information Systems 10 (6), 2023
12023
SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud
M Siraj, M Ninggal, IH Hj, NI Udzir, MDH Abdullah, A Asmawi
arXiv preprint arXiv:2004.02543, 2020
12020
A Survey on Artificial Immune System-Based Intrusion Detection System for DBMS
A Asmawi, ZM Sidek
Postgraduate Annual Research Seminar, 2007
12007
Development of BlockScholar as an Educational Mobile Application on Blockchain Technology
A Asmawi, EM Saifulbahri, NAM Ariffin
Journal of Advanced Research in Applied Sciences and Engineering Technology …, 2024
2024
WBEC: A WEB BROWSERS EVIDENCE COLLECTION TOOLKIT FOR WEB BROWSERS USAGE IN WINDOWS 10
DM Rayman, A Asmawi, NAM Ariffin
International Journal of Technology Management and Information System 4 (1 …, 2022
2022
XTRUST: A SEVERITY-AWARE TRUST-BASED ACCESS CONTROL FOR ENHANCING SECURITY LEVEL OF XML DATABASE FROM INSIDER THREATS
L SurianiAffendey
PalArch's Journal of Archaeology of Egypt/Egyptology 18 (3), 4121-4128, 2021
2021
Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control
A Asmawi, LS Affendey, NI Udzir, R Mahmod
International Journal of Computer and Information Engineering 8 (6), 961-963, 2014
2014
XIPS: A Model-based Prevention Mechanism for Preventing Blind XPath Injection in Database-Centric Web Services Environment
A Asmawi, LS Affendey, NI Udzir, R Mahmod
International Journal of Advancements in Computing Technology (IJACT) 5 (10), 69, 2013
2013
Blind Xpath Injection Prevention System (BXIPS): An Education Tool for Computer Science Undergraduate Students Toward Secure Coding Practices in Web Services Development Course
A Asmawi, LS Affendey, NI Udzir, R Mahmod
2013
Hybrid Detection Technique for Databases Intrusion Using SQL Injection and Insider Misuse Data
A Asmawi
Universiti Teknologi Malaysia, 2010
2010
TWO LEVEL SECURITY APPROACHES FOR SECURE XML DATABASE CENTRIC WEB SERVICES AGAINST XPATH INJECTIONS
A ASMAWI
The system can't perform the operation now. Try again later.
Articles 1–20