3
2009
A Dynamic Threshold Calculation for Congestion Notification in IEEE 802.1Qbb

Waqar Khurshid , Imran A. Khan , L. M. Kiah , Osman Khalid
IEEE Communications Letters 24 ( 4) 744 -747

2020
T hings, Journal of Network and Computer Applications

Mussab Alaa , A Zaidan , B Zaidan , Mohammed Talal

1
2017
A security framework for mHealth apps on Android platform

Muzammil Hussain , Ahmed Al-Haiqi , Aws Alaa Zaidan , Bilal Bahaa Zaidan
Computers & Security 75 191 -217

47
2018
Unicast position-based routing protocols for ad-hoc networks

Miss Kiah , Liana Qabajeh , Mohammed Qabajeh

11
2010
A review of smart contract blockchain based on multi-criteria analysis: challenges and motivations

Norah M Alshahrani , ML Kiah , BB Zaidan , Abdullah Hussein Alamoodi
arXiv preprint arXiv:2302.08496

2
2023
Scalability of blockchain: a comprehensive review and future research direction

Iqra Sadia Rao , ML Kiah , M Muzaffar Hameed , Zain Anwer Memon
Cluster Computing 1 -24

1
2024
Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks

Farid Binbeshr , Lip Yee , ML Kiah
Challenge-Response Pin Authentication System to Withstand Shoulder Surfing and Recording Attacks

Exploring Manet Security Aspects: Analysis of Attacks and Node Misbehaviour Issues

Burhan Ul Islam Khan , Farhat Anwar , Farah Diyana Bt Abdul Rahman , Rashidah Funke Olanrewaju
Malaysian Journal of Computer Science 35 ( 4) 307 -338

2
2022
Implementing a CBR Recommender for Honeypot Configuration using jCOLIBRI

Wira Zanoramy Zakaria , Laila Mat Kiah
Conference Paper. Conference: 3rd International Conference on Computer Science and Computational Mathematics (ICCSCM 2014)

2
2014
A Review for Developing an Adaptive Honeypot using Case-based Reasoning Approach

Wira Zanoramy Ansiry Zakaria , Laila Mat Kiah
Conference on Computer Science & Computational Mathematics (ICCSCM 2013) 56 -56

2013
Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs

Rashidah F. Olanrewaju , Burhan Ul Islam Khan , Roohie N. Mir , Miss Laiha Binti Mat Kiah
IEEE Access 9 61778 -61792

2021
Authenticated encryption schemes: A systematic review

Mohamud Ahmed Jimale , Muhammad Reza Z’aba , Miss Laiha Binti Mat Kiah , Mohd Yamani Idna Idris
IEEE Access 10 14739 -14766

5
2022
A frictionless and secure user authentication in web-based premium applications

Rashidah F Olanrewaju , Burhan Ul Islam Khan , Malik Arman Morshidi , Farhat Anwar
IEEE Access 9 129240 -129255

14
2021
Evolution and Analysis Of Secure Hash Algorithm (Sha) Family

Burhan Ul Islam Khan , Rashidah Funke Olanrewaju , Malik Arman Morshidi , Roohie Naaz Mir
Malaysian Journal of Computer Science 35 ( 3) 179 -200

12
2022
Parallel sponge-based authenticated encryption with side-channel protection and adversary-invisible nonces

Mohamud Ahmed Jimale , Muhammad Reza Z’aba , Miss Laiha Binti Mat Kiah , Mohd Yamani Idna Idris
IEEE Access 10 50819 -50838

3
2022
Sponge-Based Parallel Authenticated Encryption With Variable Tag Length and Side-Channel Protection

Mohamud Ahmed Jimale , Nor Aniza Abdullah , Miss Laiha Binti Mat Kiah , Mohd Yamani Idna Idris
IEEE Access 11 59661 -59674

2023
EDoS Eye: A Game Theoretic Approach to Mitigate Economic Denial of Sustainability Attack in Cloud

Fahad Zaman Chowdhury , Mohd Yamani Idna Bin Idris , Miss Laiha Binti Mat Kiah , MA Manazir Ahsan

A systematic review of PIN-entry methods resistant to shoulder-surfing attacks

Farid Binbeshr , M.L. Mat Kiah , Lip Yee Por , A.A. Zaidan
Computers & Security 101 102116

2021