Up a level |
Palanisamy, Rathika and Norman, Azah Anir and Mat Kiah, Miss Laiha (2024) Employees' BYOD security policy compliance in the public sector. Journal of Computer Information Systems, 64 (1). pp. 62-77. ISSN 0887-4417, DOI https://doi.org/10.1080/08874417.2023.2178038.
Palanisamy, Rathika and Norman, Azah Anir and Mat Kiah, Miss Laiha (2024) Employees’ BYOD security policy compliance in the public sector. Journal of Computer Information Systems, 64 (1). 62 – 77. ISSN 0887-4417, DOI https://doi.org/10.1080/08874417.2023.2178038.
Binbeshr, Farid and Por, Lip Yee and Mat Kiah, Miss Laiha and Zaidan, A. A. and Imam, Muhammad (2023) Secure PIN-entry method using one-time PIN (OTP). IEEE Access, 11. pp. 18121-18133. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2023.3243114.
Mustafa, Mumtaz Begum and Yusoof, Mansoor Ali and Khalaf, Hasan Kahtan and Abushariah, Ahmad Abdel Rahman Mahmoud and Mat Kiah, Miss Laiha and Ting, Hua Nong and Muthaiyah, Saravanan (2022) Code-switching in automatic speech recognition: The issues and future directions. Applied Sciences-Basel, 12 (19). ISSN 2076-3417, DOI https://doi.org/10.3390/app12199541.
Al-Hussein, Ward Ahmed and Por, Lip Yee and Mat Kiah, Miss Laiha and Zaidan, Bilal Bahaa (2022) Driver behavior profiling and recognition using deep-learning methods: In accordance with traffic regulations and experts guidelines. International Journal of Environmental Research and Public Health, 19 (3). ISSN 1660-4601, DOI https://doi.org/10.3390/ijerph19031470.
Palanisamy, Rathika and Norman, Azah Anir and Mat Kiah, Miss Laiha (2022) BYOD policy compliance: risks and strategies in organizations. Journal of Computer Information Systems, 62 (1). pp. 61-72. ISSN 0887-4417, DOI https://doi.org/10.1080/08874417.2019.1703225.
Anwar, Farhat and Khan, Burhan Ul Islam and Mat Kiah, Miss Laiha and Abdullah, Nor Aniza and Goh, Khang Wen (2022) Comprehensive insight into blockchain technology: Past development, present impact and future considerations. International Journal of Advanced Computer Science and Applications, 13 (11). pp. 878-907. ISSN 2158-107X, DOI https://doi.org/10.14569/IJACSA.2022.01311101.
Khan, Burhan Ul Islam and Olanrewaju, Rashidah Funke and Morshidi, Malik Arman and Mir, Roohie Naaz and Mat Kiah, Miss Laiha and Khan, Abdul Mobeen (2022) Evolution and analysis of secure hash algorithm (SHA) family. Malaysian Journal of Computer Science, 35 (3). pp. 179-200. ISSN 0127-9084, DOI https://doi.org/10.22452/mjcs.vol35no3.1.
Jimale, Mohamud Ahmed and Z'aba, Muhammad Reza and Mat Kiah, Miss Laiha and Idris, Mohd Yamani Idna and Jamil, Norziana and Mohamad, Moesfa Soeheila and Rohmad, Mohd Saufy (2022) Parallel sponge-based authenticated encryption with side-channel protection and adversary-invisible nonces. IEEE Access, 10. pp. 50819-50838. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2022.3171853.
Khan, Burhan Ul Islam and Anwar, Farhat and Olanrewaju, Rashidah F. and Mat Kiah, Miss Laiha and Mir, Roohie N. (2021) Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs. IEEE Access, 9. pp. 61778-61792. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2021.3073343.
Olanrewaju, Rashidah F. and Khan, Burhan Ul Islam and Morshidi, Malik Arman and Anwar, Farhat and Mat Kiah, Miss Laiha (2021) A frictionless and secure user authentication in web-based premium applications. IEEE Access, 9. pp. 129240-129255. ISSN 2169-3536,
Iqbal, Salman and Mat Kiah, Miss Laiha and Rehman, Aqeel Ur and Abbas, Zahid and Daghighi, Babak (2020) DM-GKM: A key management scheme for dynamic group based applications. Computer Networks, 182. ISSN 1389-1286, DOI https://doi.org/10.1016/j.comnet.2020.107476.
Mahmood, Atif and Mat Kiah, Miss Laiha and Z'aba, Muhammad Reza and Qureshi, Adnan N. and Kassim, Muhammad Shahreeza Safiruz and Hasan, Zati Hakim Azizul and Kakarla, Jagadeesh and Amiri, Iraj Sadegh and Azzuhri, Saaidal Razalli (2020) Capacity and frequency optimization of wireless backhaul network using traffic forecasting. IEEE Access, 8. pp. 23264-23276. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2020.2970224.
Abd Rahim, Noor Hayani and Hamid, Suraya and Mat Kiah, Miss Laiha (2019) Enhancement of cybersecurity awareness program on personal data protection among youngsters in Malaysia: An assessment. Malaysian Journal of Computer Science, 32 (3). pp. 221-245. ISSN 0127-9084, DOI https://doi.org/10.22452/mjcs.vol32no3.4.
Nandy, Tarak and Idris, Mohd Yamani Idna and Noor, Rafidah Md and Mat Kiah, Miss Laiha and Lau, Sian Lun and Anuar, Nor Badrul and Ahmedy, Ismail and Ghani, Norjihan Abdul and Bhattacharyya, Sananda (2019) Review on Security of Internet of Things Authentication Mechanism. IEEE Access, 7. pp. 151054-151089. ISSN 2169-3536, DOI https://doi.org/10.1109/ACCESS.2019.2947723.
Daghighi, Babak and Mat Kiah, Miss Laiha and Iqbal, Salman and Rehman, Muhammad Habib Ur and Martin, Keith (2018) Host mobility key management in dynamic secure group communication. Wireless Networks, 24 (8). pp. 3009-3027. ISSN 1022-0038, DOI https://doi.org/10.1007/s11276-017-1511-4.
Zaidan, A.A. and Zaidan, B.B. and Hussain, M. and Haiqi, A. and Mat Kiah, Miss Laiha and Abdulnabi, M. (2015) Multi-criteria analysis for OS-EMR software selection problem: A comparative study. Decision Support Systems, 78. pp. 15-27. ISSN 0167-9236, DOI https://doi.org/10.1016/j.dss.2015.07.002.
Zaidan, B.B. and Haiqi, A. and Zaidan, A.A. and Abdulnabi, M. and Mat Kiah, Miss Laiha and Muzamel, H. (2015) A Security Framework for Nationwide Health Information Exchange based on Telehealth Strategy. Journal of Medical Systems, 39 (5). pp. 1-19. ISSN 0148-5598, DOI https://doi.org/10.1007/s10916-015-0235-1.
Majeed, A. and Mat Kiah, Miss Laiha and Madhloom, H.T. and Zaidan, B.B. and Zaidan, A.A. (2009) Novel approach for high secure and high rate data hidden in the image using image texture analysis. International Journal of Engineering and Technology, 1 (2). pp. 63-69. ISSN 0975-4024,
Abu Othman, Noor Ashitah and Norman, Azah Anir and Mat Kiah, Miss Laiha (2021) Information system audit for mobile device security assessment. In: 2021 3rd International Cyber Resilience Conference (CRC).