


default search action
CRC 2021: Langkawi Island, Malaysia
- 3rd International Cyber Resilience Conference, CRC 2021, Langkawi Island, Malaysia, January 29-31, 2021. IEEE 2021, ISBN 978-1-6654-1844-7

- Abdulrahman Sameer Sadeq, Azana Hafizah Mohd Aman, Rosilah Hassan, Hasimi Sallehudin:

Quantitative Evaluation of IEEE 802.15.4 and ISA 100.11a for large scale Wireless Sensor Network. 1-5 - Monafin Afif Fiquaro, Raja Zahilah, Siti Hajar Othman, Marina Md Arshad

, Sheikh Munir Sheikh Saad:
Vaccination System using Blockchain Technology: A Prototype Development. 1-6 - Huda Osman, Maheyzah Md Siraj, Mohd Aizaini Maarof:

HAC: Model for Privacy-Preserving Outsourced Data Over Cloud. 1-4 - Teo Wen Long, Anazida Binti Zainal, Mohd Nizam Kassim:

News Event Prediction using Causality Approach on South China Sea Conflict. 1-6 - Salman Humdullah, Siti Hajar Othman, Muhammad Najib Razali, Hazinah Kutty Mammi:

Secured Data Storage Framework for Land Registration using Blockchain Technology. 1-6 - Mohamed Mostafa Ali Montaser, Siti Hajar Othman, Raja Zahilah Raja Mohd Radzi:

Secured Tracking and Tracing System Based on Blockchain Technology. 1-6 - Sarah K. Taylor, Aswami Ariffin, Khairul Akram Zainol Ariffin

, Siti Norul Huda Sheikh Abdullah
:
Cryptocurrencies Investigation: A Methodology for the Preservation of Cryptowallets. 1-5 - Saeed Amer Alameri

, Masnizah Mohd:
Comparison of Fake News Detection using Machine Learning and Deep Learning Techniques. 1-6 - Noor Ashitah Abu Othman, Azah Anir Norman, Miss Laiha Mat Kiah

:
Information System Audit for Mobile Device Security Assessment. 1-6 - Tan Woei Ching, Azana Hafizah Mohd Aman, Wan Muhd Hazwan Azamuddin, Hasimi Sallehuddin

, Zainab Senan Attarbashi
:
Performance Analysis of Internet of Things Routing Protocol for Low Power and Lossy Networks (RPL): Energy, Overhead and Packet Delivery. 1-6 - Omar S. Saleh, Osman Ghazali, Norbik Bashah Idris:

A New Decentralized Certification Verification Privacy Control Protocol. 1-6 - Noor Azeera Abdul Aziz, Mohd Aizaini Maarof, Anazida Binti Zainal:

Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature Selection. 1-6 - Nurfazrina Mohd Zamry, Anazida Binti Zainal, Murad A. Rassam:

LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks. 1-6 - Vimal Raj Silvarajoo, Shu Yun Lim

, Paridah Daud:
Digital Evidence Case Management Tool for Collaborative Digital Forensics Investigation. 1-4 - Nuraqilah Haidah Ahmad Riduan, Cik Feresa Mohd Foozy, Isredza Rahmi A. Hamid

, Palaniappan Shamala
, Nur Fadzilah Othman:
Data Wiping Tool: ByteEditor Technique. 1-6 - Tan Woei Ching, Azana Hafizah Mohd Aman, Wan Muhd Hazwan Azamuddin, Zainab Senan Attarbashi

:
Performance Evaluation of AODV Routing Protocol in MANET using NS-3 Simulator. 1-4 - Mustafa Sabah Taha, Mohammed Hashim Mahdi, Hiyam N. Khalid, Azana Hafizah Mohd Aman, Zainab Senan Attarbashi

:
A Steganography Embedding Method Based on Psingle / Pdouble and Huffman Coding. 1-6 - Koh Leong Chien, Anazida Binti Zainal, Fuad A. Ghaleb

, Mohd Nizam Kassim:
Application of Knowledge-oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues. 1-7 - Mohammad N. Olaimat

, Mohd Aizaini Maarof, Bander Ali Saleh Al-rimy:
Ransomware Anti-Analysis and Evasion Techniques: A Survey and Research Directions. 1-6 - Taj-Aldeen Naser Abdali

, Rosilah Hassan, Azana Hafizah Mohd Aman:
A New Feature in Mysejahtera Application to Monitoring the Spread of COVID-19 Using Fog Computing. 1-4 - Ahmed Mahdi Jubair

, Azana Hafizah Mohd Aman, Rosilah Hassan, Hasimi Sallehudin:
Dimensionality Inspection for Wireless Sensor Network Deployment using Multi-Objective Optimization. 1-5 - Umara Urooj

, Mohd. Aizani Bin Maarof, Bander Ali Saleh Al-rimy:
A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model. 1-6 - Rakotoasimbahoaka Antsa Cyprienna, Raharijaona Zo Lalaina Yannick, Iadaloharivola Randria, Nicolas Raft Razafindrakoto:

URL Classification based on Active Learning Approach. 1-6 - Mohd Zaki Mas'ud

, Aslinda Hassan
, Wahidah Md. Shah, Shekh Faisal Abdul-Latip, Rabiah Ahmad, Aswami Ariffin, Zahri Yunos:
A Review of Digital Forensics Framework for Blockchain in Cryptocurrency Technology. 1-6 - Md Arif Hassan

, Zarina Shukur:
A Secure Multi Factor User Authentication Framework for Electronic Payment System. 1-6 - Nur Aizah Rosli, Siti Norul Huda Sheikh Abdullah

, Ahmad Nazri Zamani, Anahita Ghazvini, Nor Sakinah Md Othman, Nor Alia Athirah Abdul Muariff Tajuddin:
Comparison Multi Transfer Learning Models for Deep Fake Image Recognizer. 1-6 - Julia Juremi, Salasiah Sulaiman, Haridasan Balakrishnan, Nurul Husna Mohd Saad:

A Secure Integrated E-Wallet Mobile Application For Education Institution. 1-6 - Ahmad Mustafa Mohamad Al-Aboosi

, Samar Kamil, Siti Norul Huda Sheikh Abdullah
, Khairul Akram Zainol Ariffin
:
Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation. 1-6 - Adam Khalid, Anazida Binti Zainal, Mohd Aizaini Maarof, Fuad A. Ghaleb

:
Advanced Persistent Threat Detection: A Survey. 1-6 - Shaila Sharmin

, Hafizah Mansor:
Intrusion Detection on the In-Vehicle Network Using Machine Learning. 1-6

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














