Universiti Teknologi Malaysia Institutional Repository

Items where Year is 2013

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | D | G | H | I | J | K | M | N | R | S | T | Y | Z
Number of items at this level: 115.

A

Abdul Manaf, Azizah (2013) Practitioner factors in information technology governance. Journal of Administrative Sciences and Technology, 2013 (n/a). pp. 1-12. ISSN 2165-9435

Abdul Manaf, Azizah and Awang, Nor Fatimah (2013) Self assessment framework for detecting vulnerability in web applications. In: The Third International Conference on digital Information and Communication Technology and its Applications (DICTAP2013), 2013.

Abdul Manaf , Azizah (2013) A secure model for prevention of black hole attack in wireless mobile ad hoc networks. In: 12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS '13), 2013.

Abdul Manaf , Azizah (2013) A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques. In: 12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS '13), 2013.

Abdul Manaf , Azizah (2013) A survey for prevention of black hole attacks in wireless mobile adhoc networks using IDS agents. In: 12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS '13), 2013.

Abdul Manaf , Azizah (2013) A survey for prevention of black hole attacks in wireless mobile adhoc networks using trusted neighbor nodes. In: 12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS '13), 2013.

Abdul Manaf , Azizah (2013) A survey on key management of zigbee network. In: International Conf on E-Business Technologies on Web, Bangkok EBW 2013, 2013.

Abdul Manaf , Azizah (2013) Performance analysis in reactive routing protocols in wireless mobile ad hoc networks using DSR, AODV and AOMDV. In: International Conference on Informatics and Creative Multimedia 2013 (ICICM2013), 2013.

Abdul Rahman, Noorihan and Sahibuddin, Shamsul (2013) A systematic mapping study on requirements elicitation techniques in collaborative application. Lecture Notes on Software Engineering, 1 (1). pp. 106-111. ISSN 2301-3559

Abdullah, Mohd. Shahidan and Abdul Manaf, Azizah and Zamani, Mazdak and Hooman, Alireza (2013) An overview of principal component analysis. Journal of Signal and Information Processing, 4 (3B). pp. 173-175. ISSN 2159-4481

Abdullah, Samsu Hilmy (2013) Developing mobile native application for iOS : a prototype for students management system (SMS) of Malaysia secondary school. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Al -Mudhary, Abduljalil Saleh and Imtiaz, Md. Athar and Mirhashemi, Md. Taha and Ibrahim, Roslina (2013) Critical success factors of information technology projects. In: World Academy of Science, Engineering and Technology International Journal of Social, Human Science and Engineering .

Altaay, A. A. J. and Sahib, S. B. and Zamani, M. (2013) An introduction to image steganography techniques. In: Proceedings - 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012.

Annuar, Hairil and Shanmugam, Bharanidharan and Ahmad, Azuan and Idris, Norbik Bashah and Hasan AlBakri, Sameer and Narayana Sami, Ganthan (2013) Enhancement of network access control architecture with virtualization. In: 2013 International Conference on Informatics and Creative Multimedia.

Asl, M. H. and Kama, N. (2013) A change impact size estimation approach during the software development. In: Proceedings Of The Australian Software Engineering Conference, ASWEC.

Asl, Mehran Halimi, (2013) A change effort estimation model using impact analysis for the software development phase. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

B

Boroujerdizadeh, A. and Ghobadi, A. R. and Yaribakht, A. H. and Abdoullah M., Shahidan (2013) A novel method to reduce collusion attack possibility on watermarking. In: International Conference On Advanced Communication Technology, ICACT.

D

Daghighian, Fatemeh, (2013) The development of test coverage tool (TCT). Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Daruis , Rusni (2013) Risk management for digital cultural heritage information in Malaysia. In: ICIME 2013 Proceedings of the 4th International Conference on IS Management and Evaluation, 2013.

Davani, Zavosh Abdollahzadeh and Abdul Manaf, Azizah (2013) Enhancing key management of zigbee network by steganography method. In: Second International Conference on Informatics and Applications (ICIA),2013, Lodz, Poland, 23-25 September 2013.

Denjkolaei, Ahmad Rahimi (2013) Improving modeling fault tolerance based on aspect-oriented design. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Doraisamy, Mariayee and Ibrahim, Suhaimi and Mahrin, Mohd. Naz'ri (2013) The need for software project monitoring methodology: an exploratory survey at Malaysian Public Sector. International Journal of Innovative Computing . ISSN 2180-4370

G

Ghorbanian, Masoud and Shanmugam, Bharanidharan and Narayansamy, Ganthan and Idris, Norbik Bashah (2013) Signature-based Hybrid Intrusion Detection System (HIDS) for android devices. In: 2013 IEEE Business Engineering and Industrial Applications Colloquium (BEIAC), 2013, Malaysia.

Ghorbanian, Masoud and Shanmugam, Bharanidharan and Narayansamy, Ganthan and Idris, Norbik Bashah (2013) Signature-based hybrid intrusion detection system (HIDS) for android devices. In: 2013 IEEE Business Engineering And Industrial Applications Colloquium (BEIAC 2013), 7-9 April 2013, Malaysia.

H

Harihodin Selamat, (2013) Exploring the key factors of knowledge sharing via employee weblogs. Research Journal of Applied Sciences, Engineering and Technology, 6 (19). pp. 3686-3694. ISSN 2040-7459

Hematian, Amirshahram and Chuprat, Suriayati and Abdul Manaf, Azizah and Parsazadeh, Nadia (2013) Zero-delay FPGA-based odd-even sorting network. In: IEEE Symposium on Computer And informatics, 2013.

Hematian, Amirshahram and Chuprat, Suriayati and Manaf, Azizah Abdul and Parsazadeh, Nadia (2013) Zero-delay FPGA-based odd-even sorting network. In: 9th International Conference on Computing and Information Technology, IC2IT 2013, 9 May 2013 through 10 May 2013, Bangkok, Thailand.

Hematian, Amirshahram and T. Chuprat, Suriayati and Abdul Abdul Manaf, Azizah and Yazdani, Sepideh Foroozan and Parsazadeh, Nadia (2013) Real-time FPGA-based human iris recognition embedded system: zero-delay human iris feature extraction. In: 9th International Conference on Computing and Information Technology, IC2IT 2013, 9 May 2013 through 10 May 2013, Bangkok, Thailand.

Hussain, Noor Hamizah and Haron, HabibahNorehan and Ali, Rosmah and Radin Salim, Kamilah and Hussain, Habsah (2013) Predict-observe-explain tasks using simulation to assist students’ learning in basic electric circuits. In: International Engineering and Technology Education Conference (IETEC) 2013, 2013.

Hussain, Noor Hamizah and Salim, Kamilah Radin and Haron, Habibah Norehan and Ali, Rosmah and Hussain, Habsah (2013) Student’s alternative conception in basic electric circuit. In: Research in Engineering Education Symposium 2013, 2013.

I

Ibrahim, Roslina and Ayazi, Erfan and Nasrmalek, Shahab and Shamin, Nakhat (2013) An investigation of critical failure factors in information technology projects. Journal of Business and Management, 10 (3). pp. 87-92. ISSN 2278-487X

Ibrahim, Roslina and Mohd. Yusoff, Rasimah Che and Mohamed @ Omar, Hasiah and Jaafar, Azizah (2013) Student's perceptions on educational game for learning programming subject: a case study. In: International Conference on Information and Knowledge Technology, 2013.

Ibrahim, Suhaimi (2013) Usability risk as a risk in software development projects. In: The 7th Malaysian Software Engineering Conference (MySEC 2013), 2013.

Ibrahim, Suhaimi and Selamat, Harihodin and Mahrin, Mohd. Naz’ri (2013) A comparative evaluation of approaches for model testability. International Journal of Computers & Technology, 9 (1). pp. 949-955. ISSN 0260-2288

Idris, Norbik Bashah (2013) Cloud computing security concerns analysis. In: 2013 IEEE Symposium on Business, Engineering and Industrial Applications.

Ismail, Zuraini (2013) Information privacy concerns in electronic healthcare records: a systematic literature review. In: 3rd International Conference on Research and Innovation in Information Systems (ICRIIS2013).

Ismail, Zuraini (2013) Personal medical information management: the information privacy culture of Asian countries. In: Personal Medical Information Management: The Information Privacy Culture Of Asian Countries. 3Rd International Conference On Computer Communication & Management - ICCCM13, 2013.

Ismail, Zuraini (2013) Protecting personal medical information: Asian perspective. In: Protecting Personal Medical Information: Asian Perspective. International Conference On Computer & Business Management -Iccbm13, Indexed By Google Scholar, Engineering & Technology Digital Library, Proquest And Crossref. , 2013.

Ismail, Zuraini (2013) A review of barriers for adopting healthcare information system. In: A Review Of Barriers For Adopting Healthcare Information System. E-Health Syposium, 2013.

Ismail, Zuraini and Samsuri, Suhaila (2013) Personal medical information management: the information privacy culture of Asian Countries. Journal of Economics, Business and Management, 1 (4). pp. 329-333. ISSN 2301-3567

J

Jabbar, Alaa A. and Sahib, Shahrin and Zamani, Mazdak (2013) Statistical steganalysis of four photo themes before embedding. In: International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013, 23-24 Dec, 2013, Kuching, Sawarak.

Jasmis, Jamaluddin and Ibrahim, Suhaimi and Anom, Raja Baharuddin and Mohd. Hassan, Ahmad Efendi and Elias, Shamsul Jamel (2013) Im-decrud prototype- a tool to support engineering tasks for requirements and design crosscutting concerns. ARPN Journal of Systems And Software, 3 (1). pp. 1-6. ISSN 2222-9833

Jayabalan, Prasad and Ibrahim, Roslina and Abdul Manaf, Azizah (2013) Understanding cybercrime in Malaysia: an overview. In: International Conference on Human Capital and Knowledge Management 2013, 2013.

K

Kama, Mohd. Nazri (2013) Extending change impact analysis approach for change effort estimation in the software development phase. In: 13Th Wseas International Conference on Applied Computer Science .

Karamizadeh, Sasan and Abdullah, Mohd. Shahidan and Zamani, Mazdak (2013) An overview of holistic face recognition. International Journal of Research in Computer and Communication Technology, 2 (9). pp. 738-741. ISSN 2278-5841

Khiabani, Hamed and Idris, Norbik Bashah and Ab Manan, Jamalul-lail (2013) A unified trust model for pervasive environments - simulation and analysis. KSII Transactions On Internet and Information Systems, 7 (7). pp. 1569-1584. ISSN 1976-7277

Koupaie, Hossein Moradi and Ibrahim, Suhaimi and Hosseinkhani, Javad (2013) Outlier detection in stream data by clustering method. International Journal of Advanced Computer Science and Information Technology (IJACSIT), 2 (3). pp. 25-34. ISSN 2296-1739

Koupaie, Hossein Moradi and Ibrahim, Suhaimi and Hosseinkhani, Javad (2013) Outlier detection in stream data by machine learning and feature selection methods. International Journal of Advanced Computer Science and Information Technology (IJACSIT), 2 (3). pp. 17-24. ISSN 2296-1739

Kuan, Chee Houng and Shanmugam, Bharanidharan and Samy, Ganthan Narayana and Ahmad, Azuan (2013) Security model for microsoft based mobile sales management application in private cloud computing. International Journal of Cloud Computing and Services Science, 2 (3). pp. 159-169. ISSN 2089-3337

M

M Hasnan, Siti Norhaizum and Ayu, Media A. and Mantoro, Teddy and Mazlan, M. Hasbullah and Abobakr, M. and Balfaqih, A. and Haseeb, Shariq (2013) Capwap protocol and context transfer to support seamless handover. In: 9th International Conference on Computing and Information Technology, IC2IT 2013;, 9 May 2013 through 10 May 2013, Bangkok; Thailand.

Mahmud, Yuzi and Miskon, Suraya and Ab. Rahim, Nor Zairah (2013) Preliminary findings of facebook appropriation process in family context. In: International Conference on Research and Innovation in Information Systems (ICRIIS' 13), 2013.

Mahrin, Mohd Naz'ri (2013) Environmental factors influencing requirement engineering in global software development: a review. In: The Second International Conference on Advances in Computer and Information Technology - ACIT2013.

Mahrin, Mohd. Naz'ri (2013) A comparison enterprise architecture implementation methodologies. In: International Conference on Informatics and Creative Multimedia (ICICM2013), 2013.

Mahrin, Mohd. Naz'ri (2013) Formulation of usability risk assessment model. In: 2013 IEEE Conference on Open Systems (ICOS 2013), 2013.

Mahrin, Mohd. Naz'ri (2013) Situational factors affecting requirement engineering process in global software development. In: 2013 IEEE Conference on Open Systems (ICOS 2013), 2013.

Mahrin, Mohd. Naz'ri (2013) Situational requirement engineering:a systematic literature review protocol. In: 2013 IEEE Conference on Open Systems (ICOS 2013), 2013.

Mahrin, Mohd. Naz'ri (2013) The need for software project monitoring methodology: an empirical investigation at Malaysian public sector. In: 7th Malaysian Software Engineering Conference, 2013.

Mahrin, Mohd. Naz'ri (2013) Risk generating situations of requirement engineering in global software development. In: The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), 2013.

Mahrin, Mohd. Naz'ri (2013) Standards and models on and around software requirement engineering: a review with perspective of varying situations. In: The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), 2013.

Mahrin , Mohd. Naz'ri (2013) The need for usability risk assessment model. In: The Second International Conference on Informatics Engineering & Information Science (ICIEIS2013), 2013.

Mahrin , Mohd. Naz'ri (2013) Requirement engineering process tailoring factors: a literature review. In: The Seventh Malaysian Software Engineering Conference, MySEC 2013, 2013.

Mantoro, Teddy and Asian, Jelita and Octavian, Riza and Ayu, Media Anugerah (2013) Optimal translation of English to Bahasa Indonesia using statistical machine translation system. In: 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), MAR 26-27, 2013, Rabat, Morocco.

Maroop, Nurazean (2013) Review of information security vulnerability: human perspective. In: Proceeding of The The Second International Conference on Informatics Engineering & Information Science (ICEIS2013), 2013.

Maroop, Nurazean (2013) Teleconsultation knowledge sharing in healthcare: resource influences. In: In Proceeding of 24Th Australasian Conference on Information Systems (ACIS) , 2013.

Maroop , Nurazean (2013) A conceptual model for knowledge sharing towards information security culture in healthcare organization. In: 3Rd International Conference on Research and Innovation In Information Systems 2013 - ICRILLS, 2013.

Mohamed Suffian, Muhammad Dhiauddin and Ibrahim, Suhaimi (2013) A systematic approach to predict system testing defects using prior phases metrics for V-model. Open International Journal of Informatics, 1 . pp. 1-17. ISSN 2289-2370

Mohd Azmi, Nurulhuda Firdaus and Timmis, Jon and Polack, Fiona (2013) Scenario-based modeling to capture requirements for immune inspired profile adaptation. In: 8th International Conference on Information Technology in Asia (CITA), 2013, 1st-4th July 2013, Kota Samarahan, Malaysia.

Mohd. Daud, Salwani (2013) A review on predicting outbreak of tungro disease in rice fields based on epidemiological and biophysical factors. International Journal of Innovation, Management and Technology, 4 (4). pp. 447-450. ISSN 2010-0248

Mohd. Daud, Salwani (2013) Dyslexia baca’ mobile app - the learning ecosystem for dyslexia. In: 2nd international Conference on Advanced Computer Science Applications and Technologies, 2013.

Mohd. Daud, Salwani (2013) Love science, love Islam: ilmu yang membawa kepada penciptanya. In: -.

Mohd. Daud , Salwani (2013) Modeling quality attributes and metrics for web service selection. In: The 3rd International Conference on Mathematical Sciences, ICMS 2013, 2013.

Mohd. Daud , Salwani (2013) New algorithm with bandwidth reduction for smaller size digital signature. In: 2013 International Conference on Informatics and Creative Multimedia, 2013.

Mohd. Nazri Kama, (2013) Integrated change impact analysis approach for the software development phase. International Journal of Software Engineering and Its Applications, 7 (2). pp. 293-304. ISSN 1738-9984

Mohd. Zainuddin, Norziha Megat (2013) Measuring satisfaction on augmented reality courseware for the deaf. In: 2nd International Conference On Advanced Computer Science Applications And Technologies - ACSAT 2013, 2013.

Mohd. Zainuddin, Norziha Megat (2013) A review on the success factors of e-learning. In: The Second International Conference on e-Technologies and Networks for Development (ICEN2013), 2013.

Mohebbi, Keyvan and Ibrahim, Suhaimi and Idris, Norbik Bashah (2013) Prediction of relevance between requests and web services using ann and LR models. In: 5th Asian Conference on Intelligent Information and Database Systems (ACIIDS), MAR 18-20, 2013, Kuala Lumpur, Malaysia.

Mohtasebi, Amirhossein and Ismail, Zuraini and Shanmugam, Bharanidharan (2013) Analysis of applying enterprise service bus architecture as a cloud interoperability and resource sharing platform. In: 7th International Conference On Knowledge Management In Organizations: Service And Cloud Computing.

Moorthy, Jayaletchumi T. Sambantha and Ibrahim, Suhaimi and Mahrin, Mohd. Naz'ri (2013) Identifying potential usability risk during software development process. Open International Journal of Informatics, 1 . pp. 29-45. ISSN 2289-2370

N

Nikfard, Pourya and Ibrahim, Suhaimi and Abolghasem Zadeh, Mohammad Hossein (2013) A comparative evaluation of approaches for web application testing. The International Journal of Soft Computing and Software Engineering, 3 (3). pp. 333-341. ISSN 2251-7545

Nikfard, Pourya and Ibrahim, Suhaimi and Rohani, Babak Darvish and Selamat, Harihodin and Mahrin, Mohd. Naz’ri (2013) An evaluation for model testability approaches. International Journal of Computers & Technology . pp. 1-10. ISSN 0260-2288

Nikfard, Pourya and Najafabadi, Maryam Khanian and Rouhani, Babak Darvish and Nikpay, Fatemeh and Selamat, Harihodin (2013) An empirical study into model testability. In: International Conference on Informatics and Creative Multimedia 2013 (ICICM'13), 4-6 Sept, 2013, Kuala Lumpur, Malaysia.

Nor Zairah Ab. Rahim, (2013) Predicting different conceptualizations of system use: acceptance in hedonic volitional context (facebook). Computers In Human Behavior, 29 (6). pp. 2776-2787. ISSN 0747-5632

Norbik Bashah Idris, (2013) Unified trust establishment by leveraging remote attestation - modeling and analysis. Information Management and Computer Security, 21 (5). pp. 360-380. ISSN 0968-5227

Noroozi, E. and Daud, S. B. M. and Sabouhi, A. (2013) Critical evaluation on steganography metrics. In: Advanced Materials Research.

R

Ravan, Rama Roshan and Idris, Norbik Bashah and Mehrabani, Zahra (2013) A secure method against frequency attack for pattern query on encrypted string data. In: 2013 International Conference on Informatics and Creative Multimedia, 2013.

Rouhani, Babak Darvish and Mahrin, Mohd. Naz'ri and Nikpay, Fatemeh and Najafabadi, Maryam Khanian and Nikfard, Pourya (2013) A framework for evaluation of enterprise architecture implementation methodologies. Jurnal Teknologi . pp. 1-6. ISSN 2180-3722

S

Sadeghian, Amirmohammad and Zamani, Mazdak and Abdul Manaf, Azizah (2013) A taxonomy of SQL injection detection and prevention techniques. In: international Conference on informatics and Creative Multimedia 2013 (ICICM2013). September 3-6, 2013, 2013, Kuala Lumpur.

Sahibuddin, Shamsul (2013) SRS development procedure: the roles and responsibility of key IT personnel in requirement engineering process. In: 2013 4th International Conference on Software and Computing Technology (ICSCT 2013). , 2013.

Sahibuddin , Shamsul (2013) An empirical study of the software project requirements engineering practice in Malaysia Public Sector – a perspective from the stakeholders’ challenges. In: 2013 4th International Conference on Software and Computing Technology , 2013.

Sahibuddin , Shamsul (2013) Identifying social presence factors in E-Learning using structural equation modeling analysis: a preliminary phase of requirements elicitation. In: International Conference on Engineering Education 2013.

Salah, Khalil, (2013) Performance analysis system for FELDA football management system. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Salim, Kamilah Radin (2013) An instrument for measuring the learning outcomes of laboratory work. In: International Engineering and Technology Education Conference (IETEC) 2013, 2013.

Samsuri, Suhaila and Ismail, Zuraini and Ahmad, Rabiah (2013) Protecting personal medical information: asian perspective. International Journal of Computer & Communication Engineering, 2 (4). pp. 468-472. ISSN 2010-2743

Samy, Ganthan Narayana (2013) Security issues in electronic health record. Open International Journal of Informatics (OIJI), 1 (n/a). pp. 59-68. ISSN 2289-2370

Selamat, Harihodin (2013) Developing a maturity model to measure SOEA adoption in an organisation. In: Software Engineering Postgraduate Workshop SEPOW 2013.

Selamat, Harihodin (2013) An empirical analysis of a testability model. In: International Conference on Informatics and Creative Multimedia 2013 (ICICM'13), IEEE, 2013.

Selamat, Harihodin (2013) Implementation of delone and Mcleans model of information system success to access level of students satisfaction in health center of Malaysian Universities. In: Conference on Health ans Social Care information Systems and Technologies (HCist 2013), 2013.

Selamat, Harihodin and Nikpay, Fatemeh and Babak Darvish, Rouhani and Nikfard, Pourya (2013) A review of critical success factors of enterprise architecture implementation. In: International Conference on Informatics and Creative Multimedia 2013 (ICICM'13), IEEE, 4-6 Sept. 2013, Kuala Lumpur, Malaysia.

Shafiabady, Aida (2013) Evaluating the complexity of UML class diagrams. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Shahri, A. B. and Ismail, Z. and Ab. Rahim, N. Z. (2013) Constructing conceptual model for security culture in health information systems security effectiveness. In: Advances In Intelligent Systems And Computing.

Shahri, Ahmad Bakhtiyari and Ismail, Zuraini and Ab. Rahim, Nor Zairah (2013) Security culture and security awareness as the basic factors for security effectiveness in health information system. In: 2013 AFAP Conference On Business And Management (ACBM-2013), 2nd - 3rd January, 2013, UTM Training Centre, Universiti Teknologi Malaysia, Skudai, Johor.

Shamsul Sahibuddin, (2013) Introducing the open source metamodel concept. Journal of Theoretical and Applied Information Technology, 57 (3). pp. 432-440. ISSN 1992-8645

Shanmugam, Bharanidharan (2013) Analysis and assessment of bluetooth vulnerabilites in Malaysian cars. In: International Conference on Informatics and Creative Multimedia 2013 (ICICM2013).

Shanmugam, Bharanidharan (2013) Forensic analysis tool for malicious pdf files and shellcode analysis. In: International Conference on Emerging Trends in Engineering and Technology (ICETET 2013).

Shiri, Farzane Izak and Shanmugam, Bharanidharan and Idris, Norbik Bashah and Samy, Ganthan Narayana (2013) A survey on parallel and distributed techniques for improving the performance of signature-based network intrusion detection systems. Australian Journal of Basic and Applied Sciences, 7 (6). pp. 267-273. ISSN 1991-8178

Siahdoosti, Maryam (2013) Development of staff evaluation system (SES). Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Suriayati Chuprat, (2013) A linear programming approach for scheduling divisible real-time workloads. International Journal of Computers and Their Applications, 20 (1). pp. 23-31. ISSN 1076-5204

Suriayati Chuprat, (2013) Proposing a framework for exploration of crime data using web structure and content mining. Research Journal of Applied Sciences, Engineering and Technology, 6 (19). pp. 3617-3624. ISSN 2040-7459

T

Taherdoost, Hamed and Sahibuddin, Shamsul and Ibrahim, Suhaimi and Kalantari, Alaeddin and Jalaliyoon, Neda and Ameri, Sadegh (2013) Examination of electronic service definitions. In: Proceedings - 2012 International Conference On Advanced Computer Science Applications And Technologies, ACSAT 2012, 26-28 Nov. 2012, Kuala Lumpur.

Taherdoost, Hamed and Sahibuddin, Shamsul and Jalaliyoon, Neda (2013) E-services usage evaluation: level of co-creation and digitalization. International Journal of Academic Research in Management (IJARM), 2 (1). pp. 10-18. ISSN 2296-1747

Teddy Mantoro, (2013) Reconnaissance attack on ipv6 to ipv4 tunneling. International Journal of Mobile Computing and Multimedia Communications, 5 (1). pp. 1-9. ISSN 1937-9412

Teo, Wil Ly and Abdul Manaf, Azizah and Choong, Phyllis Lai Fong (2013) Perceived effectiveness of information technology governance initiatives among it practitioners. International Journal of Engineering Business Management, 5 (1). pp. 1-9. ISSN 1847-9790

Y

Yahya, Yazriwati (2013) Antecedents and impacts of strategic business-IT alignment in Malaysian Public sector. In: 3rd International Conference on Research and Innovation In Information Systems (ICRIIS'13)..

Z

Zainal Abidin, Wardah and Uden, Lorna and Alias, Rose Alinda (2013) Investigation into a university electronic portfolio system using activity theory. In: 7th International Conference On Knowledge Management In Organizations: Service And Cloud Computing.

Zainal Abidin , Wardah (2013) Service innovation framework for electronic portfolio for a technology based university. In: The 2nd International Workshop on Learning Technology For Education In Cloud, Springer Proceedings in Complexity. Pg: 35-38. ISBN:978-94-007-7307-3, 2013.

This list was generated on Thu Sep 21 03:39:07 2017 +08.