default search action
Mohd Naz'ri Mahrin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c13]Ahmad Naim Irfan, Suriayati Chuprat, Mohd Naz'ri Mahrin, Aswami Ariffin:
Taxonomy of Cyber Threat Intelligence Framework. ICTC 2022: 1295-1300 - 2020
- [c12]Ahmad Naim Irfan, Aswami Ariffin, Mohd Naz'ri Mahrin, Syahid Anuar:
A Malware Detection Framework Based on Forensic and Unsupervised Machine Learning Methodologies. ICSCA 2020: 194-200
2010 – 2019
- 2019
- [j7]Maryam Khanian Najafabadi, Azlinah Hj. Mohamed, Mohd Naz'ri Mahrin:
A survey on data mining techniques in recommender systems. Soft Comput. 23(2): 627-654 (2019) - [c11]M. Zulfahmi Toh, Shamsul Sahibuddin, Mohd Naz'ri Mahrin:
Adoption Issues in DevOps from the Perspective of Continuous Delivery Pipeline. ICSCA 2019: 173-177 - [c10]Nilam Nur Amir Sjarif, Suriayati Chuprat, Mohd Naz'ri Mahrin, Noor Azurati Ahmad, Aswami Ariffin, Firham M. Senan, Nazri Ahmad Zamani, Afifah Saupi:
Endpoint Detection and Response: Why Use Machine Learning? ICTC 2019: 283-288 - 2018
- [c9]Anusuyah Subbarao, Mohd Naz'ri Mahrin:
Identification of Coordination Strategies and Indicators for Global Software Development Projects: Interview Outcome. SoMeT 2018: 545-558 - 2017
- [j6]Maryam Khanian Najafabadi, Mohd Naz'ri Mahrin, Suriayati Chuprat, Haslina Md Sarkan:
Improving the accuracy of collaborative filtering recommendations using clustering and association rules mining on implicit data. Comput. Hum. Behav. 67: 113-128 (2017) - [j5]Fatemeh Nikpay, Rodina Binti Ahmad, Babak Darvish Rouhani, Mohd Naz'ri Mahrin, Shahaboddin Shamshirband:
An effective Enterprise Architecture Implementation Methodology. Inf. Syst. E Bus. Manag. 15(4): 927-962 (2017) - [c8]Surya Sumarni Hussein, Mohd Naz'ri Mahrin, Nurazean Maarop:
Preliminary Study of Malaysian Public Sector (MPS) Transformation Readiness through Enterprise Architecture (EA) Establishment. PACIS 2017: 229 - [c7]Anusuyah Subbarao, Mohd Naz'ri Mahrin:
Formulating Evaluation Model to Assess the Effectiveness of Coordination Processes in Global Software Development Projects. SoMeT 2017: 593-603 - 2016
- [j4]Maryam Khanian Najafabadi, Mohd Naz'ri Mahrin:
A systematic literature review on the state of research and practice of collaborative filtering technique and implicit feedback. Artif. Intell. Rev. 45(2): 167-201 (2016) - [c6]Surya Sumarni Hussein, Zuraini Ismail, Mohd Naz'ri Mahrin, Mohd Shahidan Abdullah, Nor Zairah Ab. Rahim, Ganthan Narayana Samy, Mohamad Zainuddi Mat Taib:
Towards designing an EA readiness instrument: A systematic review. CIST 2016: 158-163 - 2015
- [j3]Babak Darvish Rouhani, Mohd Naz'ri Mahrin, Hossein Shirazi, Fatemeh Nikpay, Bita Darvish Rouhani:
An Effectiveness Model for Enterprise Architecture Methodologies. Int. J. Enterp. Inf. Syst. 11(2): 50-64 (2015) - [j2]Babak Darvish Rouhani, Mohd Naz'ri Mahrin, Fatemeh Nikpay, Rodina Binti Ahmad, Pourya Nikfard:
A systematic literature review on Enterprise Architecture Implementation Methodologies. Inf. Softw. Technol. 62: 1-20 (2015) - [c5]Noor Azura Zakaria, Suhaimi Ibrahim, Mohd Naz'ri Mahrin:
Examining Value-Based Factors in Software Development: A Survey Study in Malaysian Public Sector. ASWEC (2) 2015: 13-17 - [c4]Babak Darvish Rouhani, Mohd Naz'ri Mahrin, Fatemeh Nikpay, Pourya Nikfard, Bita Darvish Rouhani:
Agent-Oriented Based Enterprise Architecture Implementation Methodology. WorldCIST (1) 2015: 411-419 - 2014
- [j1]Philip Achimugu, Ali Selamat, Roliana Ibrahim, Mohd Naz'ri Mahrin:
A systematic literature review of software requirements prioritization research. Inf. Softw. Technol. 56(6): 568-585 (2014) - [c3]Babak Darvish Rouhani, Mohd Naz'ri Mahrin, Fatemeh Nikpay, Bita Darvish Rouhani:
Current Issues on Enterprise Architecture Implementation Methodology. WorldCIST (2) 2014: 239-246 - 2010
- [b1]Mohd Naz'ri Mahrin:
Factor-based evaluation framework for evaluating the usability of software process descriptions. University of Queensland, Australia, 2010
2000 – 2009
- 2009
- [c2]Mohd Naz'ri Mahrin, Paul A. Strooper, David A. Carrington:
Selecting Usability Evaluation Methods for Software Process Descriptions. APSEC 2009: 523-529 - 2008
- [c1]Mohd Naz'ri Mahrin, David A. Carrington, Paul A. Strooper:
Investigating Factors Affecting the Usability of Software Process Descriptions. ICSP 2008: 222-233
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint