Follow
Habibah Hashim
Habibah Hashim
Verified email at salam.uitm.edu.my
Title
Cited by
Cited by
Year
BYOD: Current state and security challenges
M Eslahi, MV Naseri, H Hashim, NM Tahir, EHM Saad
2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014
1182014
A comparison of lightweight communication protocols in robotic applications
MH Amaran, NAM Noh, MS Rohmad, H Hashim
Procedia Computer Science 76, 400-405, 2015
932015
Robot applications for autism: a comprehensive review
MA Saleh, FA Hanapiah, H Hashim
Disability and Rehabilitation: Assistive Technology 16 (6), 580-602, 2021
732021
Thermal spray coating technology: A review
RJ Talib, S Saad, MRM Toff, H Hashim
Solid State Sci Technol 11 (1), 109-117, 2003
522003
A lightweight and secure TFTP protocol for smart environment
MAM Isa, NN Mohamed, H Hashim, SFS Adnan, R Mahmod
2012 International Symposium on Computer Applications and Industrial …, 2012
50*2012
An efficient false alarm reduction approach in HTTP-based botnet detection
M Eslahi, H Hashim, NM Tahir
2013 IEEE Symposium on Computers & Informatics (ISCI), 201-205, 2013
422013
People tracking system using DeepSORT
MIH Azhar, FHK Zaman, NM Tahir, H Hashim
2020 10th IEEE international conference on control system, computing and …, 2020
412020
Evaluation of reliable UDP-based transport protocols for Internet of Things (IoT)
M Masirap, MH Amaran, YM Yussoff, R Ab Rahman, H Hashim
2016 IEEE Symposium on Computer Applications & Industrial Electronics …, 2016
392016
A hybrid anomaly classification with deep learning (DL) and binary algorithms (BA) as optimizer in the intrusion detection system (IDS)
K Atefi, H Hashim, T Khodadadi
2020 16th IEEE international colloquium on signal processing & its …, 2020
382020
Periodicity classification of HTTP traffic to detect HTTP Botnets
M Eslahi, MS Rohmad, H Nilsaz, MV Naseri, NM Tahir, H Hashim
2015 IEEE Symposium on Computer Applications & Industrial Electronics …, 2015
382015
Identity-based trusted authentication in wireless sensor network
YM Yussoff, H Hashim, MD Baba
arXiv preprint arXiv:1207.6185, 2012
342012
A review of physical attacks and trusted platforms in wireless sensor networks
YM Yussoff, H Hashim, R Rosli, MD Baba
Procedia Engineering 41, 580-587, 2012
322012
Implementation of quality of service (QoS) in multi protocol label switching (MPLS) networks
MRA Rahimi, H Hashim, R Ab Rahman
2009 5th International Colloquium on Signal Processing & Its Applications …, 2009
322009
People detection system using YOLOv3 algorithm
NI Hassan, NM Tahir, FHK Zaman, H Hashim
2020 10th IEEE international conference on control system, computing and …, 2020
292020
Anomaly analysis for the classification purpose of intrusion detection system with K-nearest neighbors and deep neural network
K Atefi, H Hashim, M Kassim
2019 IEEE 7th conference on systems, process and control (ICSPC), 269-274, 2019
292019
An analysis and comparison for popular video encryption algorithms
MA Saleh, NM Tahir, E Hisham, H Hashim
2015 IEEE Symposium on Computer Applications & Industrial Electronics …, 2015
292015
Simulation of anaerobic digestion for biogas production from food waste using SuperPro designer
N Harun, NA Othman, NA Zaki, NAM Rasul, RA Samah, H Hashim
Materials Today: Proceedings 19, 1315-1320, 2019
282019
Development of web-based smart security door using qr code system
AFM Fauzi, NN Mohamed, H Hashim, MA Saleh
2020 IEEE International Conference on Automatic Control and Intelligent …, 2020
262020
Hybrid cryptographic approach for internet ofhybrid cryptographic approach for internet ofthings applications: A review
NN Mohamed, YM Yussoff, MA Saleh, H Hashim
Journal of Information and Communication Technology 19 (3), 279-319, 2020
262020
A data collection approach for Mobile Botnet analysis and detection
M Eslahi, MR Rostami, H Hashim, NM Tahir, MV Naseri
2014 IEEE symposium on wireless technology and applications (ISWTA), 199-204, 2014
262014
The system can't perform the operation now. Try again later.
Articles 1–20