Physical authentication using random number generated (rng) keypad based on one time pad (otp) concept HRMH Hamid, NY Abdullah 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015 | 10 | 2015 |
Smoke detection alert system via mobile application WHW Ismail, HRM Husny, NY Abdullah Proceedings of the 10th international conference on ubiquitous information …, 2016 | 9 | 2016 |
Time series analysis of web server logs for an online newspaper HS Husin, L Cui, HRH Hamid, NY Abdullah Proceedings of the 7th International Conference on Ubiquitous Information …, 2013 | 6 | 2013 |
Portable Toolkit for Penetration Testing and Firewall Configuration HRH Hamid, NY Abdullah 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015 | 4 | 2015 |
Encrypted QR code system HRM Husny, NAN Binti, NA Nizar, NY Abdullah, WHW Ismail J. Comput. Technol. Creat. Content 2, 82-92, 2017 | 3 | 2017 |
Pre-processing of query logs in Web usage mining NY Abdullah, HS Husin, H Ramadhani, SV Nadarajan Industrial Engineering and Management Systems 11 (1), 82-86, 2012 | 3 | 2012 |
Parental Control System for Children on Wireless Network WHW Ismail Journal of Computing Technologies and Creative Content (JTec) 5 (1), 14-20, 2020 | 1 | 2020 |
Detection and Mitigation of Virus Ransomware HRM Husny, MSM Yussof, NY Abdullah, WHW Ismail Journal of Computing Technologies and Creative Content (JTec) 5 (1), 8-13, 2020 | 1 | 2020 |
Android Application for Car Black Box with Cloud Storage WHW Ismail, HRM Husny, NY Abdullah, CIA Janang Journal of Computing Technologies and Creative Content (JTec) 2 (1), 29-34, 2017 | 1 | 2017 |
Combination of Fingerprint and Hidden Load Cell (CFH) MRB Hashim, NY Abdullah Journal of Computing Technologies and Creative Content (JTec) 2 (1), 63-72, 2017 | 1 | 2017 |
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication NBY Abdullah, HRBMH Hamid 2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015 | 1 | 2015 |
Authentication using Audio Key Phrase Integrated with Random Number Generated Keypad HRMH Hamid, NY Abdullah, WHW Ismail Authentication using Audio Key Phrase Integrated with Random Number …, 0 | 1 | |
Two Factor Authentication: Voice Biometric and Token-Based Authentication HRMH Hamid, NW Nordin, NY Abdullah, WHW Ismail, D Abdullah Applied Problems Solved by Information Technology and Software, 27-35, 2024 | | 2024 |
Pass Matrix Based Graphical Password Authentication on the Android Platform NY Abdullah, IS Anizam, HRMH Hamid, WHW Ismail Applied Problems Solved by Information Technology and Software, 113-121, 2024 | | 2024 |
Pass Matrix Based Graphical Password Authentication on the Android Platform Check for updates NY Abdullah, IS Anizam, HRMH Hamid, WHW Ismail Applied Problems Solved by Information Technology and Software, 113, 2023 | | 2023 |
Automatic Lock System for Computer using Bluetooth and Fingerprint Authentication WHW Ismail Journal of Computing Technologies and Creative Content (JTec) 5 (1), 21-26, 2020 | | 2020 |
WATERMARKING AND ANALYSING DIGITAL IMAGE APPLICATION. NY Abdullah, SWMW Hassan, HRM Husny, WHW Ismail Journal of Computing Technologies and Creative Content (JTec) 2 (1), 24-28, 2017 | | 2017 |
Portable Penetration Testing and Firewall Configuration Toolkit MAIMA Kamil, HRM Husny, NY Abdullah Journal of Computing Technologies and Creative Content (JTec) 1 (1), 64-67, 2016 | | 2016 |
Pre-Processing of Query Logs in Web Usage Mining HS Husin, NY Abdullah, H Ramadhani, SV Nadarajan Proceedings of 12th Asia Pacific Industrial Engineering & Management Systems …, 2011 | | 2011 |
Authentication System: By Using Audio Key Phrase Identification NY Abdullah, HRH Hamid, WHBW Ismail | | |