Follow
Norhaiza Ya Abdullah
Norhaiza Ya Abdullah
Verified email at unikl.edu.my
Title
Cited by
Cited by
Year
Physical authentication using random number generated (rng) keypad based on one time pad (otp) concept
HRMH Hamid, NY Abdullah
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015
102015
Smoke detection alert system via mobile application
WHW Ismail, HRM Husny, NY Abdullah
Proceedings of the 10th international conference on ubiquitous information …, 2016
92016
Time series analysis of web server logs for an online newspaper
HS Husin, L Cui, HRH Hamid, NY Abdullah
Proceedings of the 7th International Conference on Ubiquitous Information …, 2013
62013
Portable Toolkit for Penetration Testing and Firewall Configuration
HRH Hamid, NY Abdullah
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015
42015
Encrypted QR code system
HRM Husny, NAN Binti, NA Nizar, NY Abdullah, WHW Ismail
J. Comput. Technol. Creat. Content 2, 82-92, 2017
32017
Pre-processing of query logs in Web usage mining
NY Abdullah, HS Husin, H Ramadhani, SV Nadarajan
Industrial Engineering and Management Systems 11 (1), 82-86, 2012
32012
Parental Control System for Children on Wireless Network
WHW Ismail
Journal of Computing Technologies and Creative Content (JTec) 5 (1), 14-20, 2020
12020
Detection and Mitigation of Virus Ransomware
HRM Husny, MSM Yussof, NY Abdullah, WHW Ismail
Journal of Computing Technologies and Creative Content (JTec) 5 (1), 8-13, 2020
12020
Android Application for Car Black Box with Cloud Storage
WHW Ismail, HRM Husny, NY Abdullah, CIA Janang
Journal of Computing Technologies and Creative Content (JTec) 2 (1), 29-34, 2017
12017
Combination of Fingerprint and Hidden Load Cell (CFH)
MRB Hashim, NY Abdullah
Journal of Computing Technologies and Creative Content (JTec) 2 (1), 63-72, 2017
12017
Folder Lock by Using Multimodal Biometric: Fingerprint and Signature Authentication
NBY Abdullah, HRBMH Hamid
2015 Fourth International Conference on Cyber Security, Cyber Warfare, and …, 2015
12015
Authentication using Audio Key Phrase Integrated with Random Number Generated Keypad
HRMH Hamid, NY Abdullah, WHW Ismail
Authentication using Audio Key Phrase Integrated with Random Number …, 0
1
Two Factor Authentication: Voice Biometric and Token-Based Authentication
HRMH Hamid, NW Nordin, NY Abdullah, WHW Ismail, D Abdullah
Applied Problems Solved by Information Technology and Software, 27-35, 2024
2024
Pass Matrix Based Graphical Password Authentication on the Android Platform
NY Abdullah, IS Anizam, HRMH Hamid, WHW Ismail
Applied Problems Solved by Information Technology and Software, 113-121, 2024
2024
Pass Matrix Based Graphical Password Authentication on the Android Platform Check for updates
NY Abdullah, IS Anizam, HRMH Hamid, WHW Ismail
Applied Problems Solved by Information Technology and Software, 113, 2023
2023
Automatic Lock System for Computer using Bluetooth and Fingerprint Authentication
WHW Ismail
Journal of Computing Technologies and Creative Content (JTec) 5 (1), 21-26, 2020
2020
WATERMARKING AND ANALYSING DIGITAL IMAGE APPLICATION.
NY Abdullah, SWMW Hassan, HRM Husny, WHW Ismail
Journal of Computing Technologies and Creative Content (JTec) 2 (1), 24-28, 2017
2017
Portable Penetration Testing and Firewall Configuration Toolkit
MAIMA Kamil, HRM Husny, NY Abdullah
Journal of Computing Technologies and Creative Content (JTec) 1 (1), 64-67, 2016
2016
Pre-Processing of Query Logs in Web Usage Mining
HS Husin, NY Abdullah, H Ramadhani, SV Nadarajan
Proceedings of 12th Asia Pacific Industrial Engineering & Management Systems …, 2011
2011
Authentication System: By Using Audio Key Phrase Identification
NY Abdullah, HRH Hamid, WHBW Ismail
The system can't perform the operation now. Try again later.
Articles 1–20