Universiti Teknologi Malaysia Institutional Repository

Items where Year is 2013

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Item Type | No Grouping
Jump to: A | B | D | G | H | I | J | K | M | N | R | S | T | Z
Number of items at this level: 45.

A

Abdul Manaf, Azizah and Awang, Nor Fatimah (2013) Self assessment framework for detecting vulnerability in web applications. In: The Third International Conference on digital Information and Communication Technology and its Applications (DICTAP2013), 2013.

Abdullah, Samsu Hilmy (2013) Developing mobile native application for iOS : a prototype for students management system (SMS) of Malaysia secondary school. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Altaay, A. A. J. and Sahib, S. B. and Zamani, M. (2013) An introduction to image steganography techniques. In: Proceedings - 2012 International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2012.

Annuar, Hairil and Shanmugam, Bharanidharan and Ahmad, Azuan and Idris, Norbik Bashah and Hasan AlBakri, Sameer and Narayana Sami, Ganthan (2013) Enhancement of network access control architecture with virtualization. In: 2013 International Conference on Informatics and Creative Multimedia.

Araghi, Tanya Koohpayeh and Zamani, Mazdak and Abdul Manaf, Azizah (2013) Performance analysis in reactive routing protocols in wireless mobile ad hoc networks using DSR, AODV and AOMDV. In: International Conference on Informatics and Creative Multimedia 2013 (ICICM2013), 2013.

Araghi, Tanya Koohpayeh and Zamani, Mazdak and Abdul Manaf, Azizah and Abdullah, Shahidan M. (2013) A survey for prevention of black hole attacks in wireless mobile adhoc networks using IDS agents. In: 12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS '13), 2013.

Araghi, Tanya Koohpayeh and Zamani, Mazdak and Abdul Manaf, Azizah and M. Abdullah, Shahidan and Bojnord, Hoda Soltanian and Araghi, Sagheb Kohpayeh (2013) A secure model for prevention of black hole attack in wireless mobile ad hoc networks. In: 12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS '13), 2013.

Araghi, Tanya Koohpayeh and Zamani, Mazdak and Abdul Manaf, Azizah and M. Abdullah, Shahidan and Lyastani, Sanam Ghorbani and Araghi, Agheb Kohpayeh (2013) A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques. In: 12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS '13), 2013.

Araghi, Tanya Koohpayeh and Zamani, Mazdak and Abdul Manaf, Azizah and M. Abdullah, Shahidan and Lyastani, Sanam Ghorbani and Araghi, Sagheb Kohpayeh (2013) A survey for prevention of black hole attacks in wireless mobile adhoc networks using trusted neighbor nodes. In: 12th WSEAS International Conference on Applied Computer and Applied Computational Science (ACACOS '13), 2013.

Asl, M. H. and Kama, N. (2013) A change impact size estimation approach during the software development. In: Proceedings Of The Australian Software Engineering Conference, ASWEC.

Asl, Mehran Halimi, (2013) A change effort estimation model using impact analysis for the software development phase. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

B

Boroujerdizadeh, A. and Ghobadi, A. R. and Yaribakht, A. H. and Abdoullah, Shahidan (2013) A novel method to reduce collusion attack possibility on watermarking. In: International Conference On Advanced Communication Technology, ICACT.

D

Daghighian, Fatemeh, (2013) The development of test coverage tool (TCT). Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Davani, Zavosh Abdollahzadeh and Abdul Manaf, Azizah (2013) A survey on key management of zigbee network. In: International Conf on E-Business Technologies on Web, BangkokEBW 2013, 2013.

Denjkolaei, Ahmad Rahimi (2013) Improving modeling fault tolerance based on aspect-oriented design. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Doraisamy, Mariayee and Ibrahim, Suhaimi and Mahrin, Mohd. Naz'ri (2013) The need for software project monitoring methodology: an exploratory survey at Malaysian Public Sector. International Journal of Innovative Computing . ISSN 2180-4370

G

Ghorbanian, Masoud and Shanmugam, Bharanidharan and Narayansamy, Ganthan and Idris, Norbik Bashah (2013) Signature-based hybrid intrusion detection system (HIDS) for android devices. In: 2013 IEEE Business Engineering And Industrial Applications Colloquium (BEIAC 2013), 7-9 April 2013, Malaysia.

H

Hematian, Amirshahram and Chuprat, Suriayati and Abdul Manaf, Azizah and Parsazadeh, Nadia (2013) Zero-delay FPGA-based odd-even sorting network. In: IEEE Symposium on Computer And informatics, 2013.

Hematian, Amirshahram and Chuprat, Suriayati and Manaf, Azizah Abdul and Parsazadeh, Nadia (2013) Zero-delay FPGA-based odd-even sorting network. In: 9th International Conference on Computing and Information Technology, IC2IT 2013, 9 May 2013 through 10 May 2013, Bangkok, Thailand.

Hematian, Amirshahram and T. Chuprat, Suriayati and Abdul Abdul Manaf, Azizah and Yazdani, Sepideh Foroozan and Parsazadeh, Nadia (2013) Real-time FPGA-based human iris recognition embedded system: zero-delay human iris feature extraction. In: 9th International Conference on Computing and Information Technology, IC2IT 2013, 9 May 2013 through 10 May 2013, Bangkok, Thailand.

I

Ismail, Zuraini and Samsuri, Suhaila (2013) Personal medical information management: the information privacy culture of Asian Countries. Journal of Economics, Business and Management, 1 (4). pp. 329-333. ISSN 2301-3567

J

Jabbar, Alaa A. and Sahib, Shahrin and Zamani, Mazdak (2013) Statistical steganalysis of four photo themes before embedding. In: International Conference on Advanced Computer Science Applications and Technologies, ACSAT 2013, 23-24 Dec, 2013, Kuching, Sawarak.

Jasmis, Jamaluddin and Ibrahim, Suhaimi and Anom, Raja Baharuddin and Mohd. Hassan, Ahmad Efendi and Elias, Shamsul Jamel (2013) Im-decrud prototype- a tool to support engineering tasks for requirements and design crosscutting concerns. ARPN Journal of Systems And Software, 3 (1). pp. 1-6. ISSN 2222-9833

K

Koupaie, Hossein Moradi and Ibrahim, Suhaimi and Hosseinkhani, Javad (2013) Outlier detection in stream data by clustering method. International Journal of Advanced Computer Science and Information Technology (IJACSIT), 2 (3). pp. 25-34. ISSN 2296-1739

Koupaie, Hossein Moradi and Ibrahim, Suhaimi and Hosseinkhani, Javad (2013) Outlier detection in stream data by machine learning and feature selection methods. International Journal of Advanced Computer Science and Information Technology (IJACSIT), 2 (3). pp. 17-24. ISSN 2296-1739

Kuan, Chee Houng and Shanmugam, Bharanidharan and Samy, Ganthan Narayana and Ahmad, Azuan (2013) Security model for microsoft based mobile sales management application in private cloud computing. International Journal of Cloud Computing and Services Science, 2 (3). pp. 159-169. ISSN 2089-3337

M

M Hasnan, Siti Norhaizum and Ayu, Media A. and Mantoro, Teddy and Mazlan, M. Hasbullah and Abobakr, M. and Balfaqih, A. and Haseeb, Shariq (2013) Capwap protocol and context transfer to support seamless handover. In: 9th International Conference on Computing and Information Technology, IC2IT 2013;, 9 May 2013 through 10 May 2013, Bangkok; Thailand.

Mantoro, Teddy and Asian, Jelita and Octavian, Riza and Ayu, Media Anugerah (2013) Optimal translation of English to Bahasa Indonesia using statistical machine translation system. In: 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M), MAR 26-27, 2013, Rabat, Morocco.

Mohd Azmi, Nurulhuda Firdaus and Timmis, Jon and Polack, Fiona (2013) Scenario-based modeling to capture requirements for immune inspired profile adaptation. In: 8th International Conference on Information Technology in Asia (CITA), 2013, 1st-4th July 2013, Kota Samarahan, Malaysia.

Mohd. Daud, Salwani and Abas, Hafiza (2013) Dyslexia baca’ mobile app - the learning ecosystem for dyslexia. In: 2nd international Conference on Advanced Computer Science Applications and Technologies, 2013, Kuching, Malaysia.

Mohebbi, Keyvan and Ibrahim, Suhaimi and Idris, Norbik Bashah (2013) Prediction of relevance between requests and web services using ann and LR models. In: 5th Asian Conference on Intelligent Information and Database Systems (ACIIDS), MAR 18-20, 2013, Kuala Lumpur, Malaysia.

Mohtasebi, Amirhossein and Ismail, Zuraini and Shanmugam, Bharanidharan (2013) Analysis of applying enterprise service bus architecture as a cloud interoperability and resource sharing platform. In: 7th International Conference On Knowledge Management In Organizations: Service And Cloud Computing.

N

Nikfard, Pourya and Najafabadi, Maryam Khanian and Rouhani, Babak Darvish and Nikpay, Fatemeh and Selamat, Harihodin (2013) An empirical study into model testability. In: International Conference on Informatics and Creative Multimedia 2013 (ICICM'13), 4-6 Sept, 2013, Kuala Lumpur, Malaysia.

Noroozi, E. and Daud, S. B. M. and Sabouhi, A. (2013) Critical evaluation on steganography metrics. In: Advanced Materials Research.

R

Ravan, Rama Roshan and Idris, Norbik Bashah and Mehrabani, Zahra (2013) A secure method against frequency attack for pattern query on encrypted string data. In: 2013 International Conference on Informatics and Creative Multimedia, 2013.

S

Sadeghian, Amirmohammad and Zamani, Mazdak and Abdul Manaf, Azizah (2013) A taxonomy of SQL injection detection and prevention techniques. In: international Conference on informatics and Creative Multimedia 2013 (ICICM2013). September 3-6, 2013, 2013, Kuala Lumpur.

Salah, Khalil (2013) Performance analysis system for FELDA football management system. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Samsuri, Suhaila and Ismail, Zuraini and Ahmad, Rabiah (2013) Protecting personal medical information: asian perspective. International Journal of Computer & Communication Engineering, 2 (4). pp. 468-472. ISSN 2010-2743

Samy, Ganthan Narayana (2013) Security issues in electronic health record. Open International Journal of Informatics (OIJI), 1 (n/a). pp. 59-68. ISSN 2289-2370

Shafiabady, Aida (2013) Evaluating the complexity of UML class diagrams. Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

Shahri, A. B. and Ismail, Z. and Ab. Rahim, N. Z. (2013) Constructing conceptual model for security culture in health information systems security effectiveness. In: Advances In Intelligent Systems And Computing.

Siahdoosti, Maryam (2013) Development of staff evaluation system (SES). Masters thesis, Universiti Teknologi Malaysia, Advanced Informatics School.

T

Taherdoost, Hamed and Sahibuddin, Shamsul and Ibrahim, Suhaimi and Kalantari, Alaeddin and Jalaliyoon, Neda and Ameri, Sadegh (2013) Examination of electronic service definitions. In: Proceedings - 2012 International Conference On Advanced Computer Science Applications And Technologies, ACSAT 2012, 26-28 Nov. 2012, Kuala Lumpur.

Taherdoost, Hamed and Sahibuddin, Shamsul and Jalaliyoon, Neda (2013) E-services usage evaluation: level of co-creation and digitalization. International Journal of Academic Research in Management (IJARM), 2 (1). pp. 10-18. ISSN 2296-1747

Z

Zainal Abidin, Wardah and Uden, Lorna and Alias, Rose Alinda (2013) Investigation into a university electronic portfolio system using activity theory. In: 7th International Conference On Knowledge Management In Organizations: Service And Cloud Computing.

This list was generated on Thu Nov 23 03:34:10 2017 +08.