APWConCSE 2018

AHM Razibul , Abdul Mazid , Ahmad Almogren , Alok Sharma

APWC on CSE 2016 Program Committee

AHM Razibul , Visionstream Pvt Lt , Australia Abdul Mazid , Alok Sharma

3
2009
A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb

Waqar Khurshid , Imran A. Khan , L. M. Kiah , Osman Khalid
IEEE Communications Letters 24 ( 4) 744 -747

2020
A security framework for mHealth apps on Android platform

Muzammil Hussain , Ahmed Al-Haiqi , Aws Alaa Zaidan , Bilal Bahaa Zaidan
Computers & Security 75 191 -217

47
2018
Secure pin-entry method using one-time pin (OTP)

M. Binbeshr , F. , Por , L.Y.
IEEE Access 11 18121 -18133

8
2023
Minimizing errors in identifying malicious api to detect pe malwares using artificial costimulation

S Mirza Abdulla , ML Mat Kiah , O Zakaria
International Conference on Emerging Trends in Computer and Electronics Engineering 49 -54

7
2012
’Aba

A Mahmood , ML Mat Kiah , Z Reza ,
M 23264 -23276

5
4
2018
A review of dynamic and intelligent honeypots

Wira Zanoramy Ansiry Zakaria , Miss Laiha Mat Kiah ,
Scienceasia ( 1) 1

10
2013
T hings, Journal of Network and Computer Applications

Mussab Alaa , A Zaidan , B Zaidan , Mohammed Talal

1
2017
A security framework for mHealth apps on Android platform

Muzammil Hussain , Ahmed Al-Haiqi , Aws Alaa Zaidan , Bilal Bahaa Zaidan
Computers & Security 75 191 -217

47
2018
Unicast position-based routing protocols for ad-hoc networks

Miss Kiah , Liana Qabajeh , Mohammed Qabajeh

11
2010
A review of smart contract blockchain based on multi-criteria analysis: challenges and motivations

Norah M Alshahrani , ML Kiah , BB Zaidan , Abdullah Hussein Alamoodi
arXiv preprint arXiv:2302.08496

2
2023
Scalability of blockchain: a comprehensive review and future research direction

Iqra Sadia Rao , ML Kiah , M Muzaffar Hameed , Zain Anwer Memon
Cluster Computing 1 -24

1
2024
Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks

Farid Binbeshr , Lip Yee , ML Kiah
Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks

Exploring Manet Security Aspects: Analysis of Attacks and Node Misbehaviour Issues

Burhan Ul Islam Khan , Farhat Anwar , Farah Diyana Bt Abdul Rahman , Rashidah Funke Olanrewaju
Malaysian Journal of Computer Science 35 ( 4) 307 -338

2
2022
Implementing a CBR Recommender for Honeypot Configuration using jCOLIBRI

Wira Zanoramy Zakaria , Laila Mat Kiah
Conference Paper. Conference: 3rd International Conference on Computer Science and Computational Mathematics (ICCSCM 2014)

2
2014