Follow
Manmeet Mahinderjit Singh
Manmeet Mahinderjit Singh
Associate Professor, School of Computer Sciences, University Sains Malaysia
Verified email at usm.my - Homepage
Title
Cited by
Cited by
Year
Wearable technology devices security and privacy vulnerability analysis
KW Ching, MM Singh
International Journal of Network Security & Its Applications 8 (3), 19-30, 2016
1812016
Impact of coronavirus pandemic crisis on technologies and cloud computing applications
ZR Alashhab, M Anbar, MM Singh, YB Leau, ZA Al-Sai, SA Alhayja’a
Journal of Electronic Science and Technology 19 (1), 100059, 2021
1732021
Sensors-enabled smart attendance systems using NFC and RFID technologies
CB Chew, M Mahinderjit-Singh, KC Wei, TW Sheng, MH Husin, N Malim
Int. J. New Comput. Archit. Appl 5, 19-29, 2015
702015
Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment
LL Bann, MM Singh, A Samsudin
Procedia Computer Science 72, 129-136, 2015
392015
Habituation effects in computer security warning
A Amran, ZF Zaaba, MK Mahinderjit Singh
Information security journal: A global perspective 27 (4), 192-204, 2018
372018
Near Field Communication (NFC) technology security vulnerabilities and countermeasures
MM Singh, K Adzman, R Hassan
International Journal of Engineering & Technology 7 (4.31), 298-305, 2018
372018
SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD) MODEL
MM Singh, SS Siang, OY San, N Hashimah, AH Malim, ARM Shariff
342014
Security and privacy risks awareness for bring your own device (BYOD) paradigm
MM Singh, CW Chan, Z Zulkefli
International Journal of Advanced Computer Science and Applications 8 (2), 2017
322017
Usable security: revealing end-users comprehensions on security warnings
A Amran, ZF Zaaba, MM Singh, AW Marashdih
Procedia Computer Science 124, 624-631, 2017
282017
Improving the diffusion of the stream cipher salsa20 by employing a chaotic logistic map
M Almazrooie, A Samsudin, MM Singh
Journal of Information Processing Systems 11 (2), 310-324, 2015
272015
Trust in RFID-enabled supply-chain management
M Mahinderjit-Singh, X Li
International Journal of Security and Networks 5 (2-3), 96-105, 2010
272010
Security strategies for hindering watering hole cyber crime attack
KA Ismail, MM Singh, N Mustaffa, P Keikhosrokiani, Z Zulkefli
Procedia Computer Science 124, 656-663, 2017
252017
Security analysis of mobile crowd sensing applications
NP Owoh, MM Singh
Applied Computing and Informatics 18 (1/2), 2-21, 2022
242022
Email spam detection: a method of metaclassifiers stacking
M ZhiWei, MM Singh, ZF Zaaba
The 6th international conference on computing and informatics, 750-757, 2017
242017
Advanced persistent threat mitigation using multi level security–access control framework
Z Zulkefli, MM Singh, NHAH Malim
Computational Science and Its Applications--ICCSA 2015: 15th International …, 2015
222015
Exploration of mobile device behavior for mitigating advanced persistent threats (APT): a systematic literature review and conceptual framework
T Jabar, M Mahinderjit Singh
Sensors 22 (13), 4662, 2022
192022
Typosquat cyber crime attack detection via smartphone
Z Zulkefli, MM Singh, ARM Shariff, A Samsudin
Procedia Computer Science 124, 664-671, 2017
192017
SenseCrypt: a security framework for mobile crowd sensing applications
N Pius Owoh, M Mahinderjit Singh
Sensors 20 (11), 3280, 2020
182020
Investigating the Importance of Implementing Ethical Value on a Healthcare System within a Social Media context.
NM R.Khanna, M.Mahinderjit Singh, F. Damanhoori
International Journal of Innovation, Creativity and Change 12 (5), 352-368, 2020
182020
Automatic annotation of unlabeled data from smartphone-based motion and location sensors
N Pius Owoh, M Mahinderjit Singh, ZF Zaaba
Sensors 18 (7), 2134, 2018
182018
The system can't perform the operation now. Try again later.
Articles 1–20