Follow
NURULAKMAL HASHIM
Title
Cited by
Cited by
Year
Risk assessment method for insider threats in cyber security: A review
NA Hashim, ZZ Abidin, AP Puvanasvaran, NA Zakaria, R Ahmad
International Journal of Advanced Computer Science and Applications 9 (11), 2018
322018
Comparison between Louvain and Leiden algorithm for network structure: a review
SHH Anuar, ZA Abas, NM Yunos, NHM Zaki, NA Hashim, MF Mokhtar, ...
Journal of Physics: Conference Series 2129 (1), 012028, 2021
112021
A new model of crypt edge detection using PSO and Bi-cubic interpolation for iris recognition
NA Hashim, Z ZainalAbidin, AS Shibghatullah, Z AbalAbas, N Yusof
Advanced computer and communication engineering technology: proceedings of …, 2016
42016
Iris Feature Detection using Split Block and PSO for Iris Identification System
NA Hashim, ZZ Abidin, AS Shibghatullah
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 9 …, 2017
32017
Enhanced approach of risk assessment for insider threats detection in smart manufacturing
NA Hashim, ZZ Abidin, ZA Abas, NA Zakaria, R Ahmad, E Mardaid
IOP Conference Series: Materials Science and Engineering 864 (1), 012053, 2020
22020
Conceptual Model of Risk Assessment for Insider Threats Detection
ZZ Abidin, ZA Abas, NA Zakaria, NA Hashim, E Mardaid, R Ahmad, ...
2019 1st International Conference on Electrical, Control and Instrumentation …, 2019
22019
Crypt matching using EACO for iris recognition
Z Zainal Abidin, Z Abal Abas, R Ahmad, NA Hashim, MR Ramli
International Journal of Applied Engineering Research 12 (22), 12814-12820, 2017
22017
Crypt Edge Detection using Enhanced Ant Colony Optimization for Iris Recognition
Z. Zainal Abidin, N.A. Hashim, R. Ahmad, Z. Abal Abas, A.B. Shibghatullah, S ...
International Conference on Computer Science and Computational Mathematics …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–8