Nor Fazlida Mohd Sani
Nor Fazlida Mohd Sani
Associate Professor, Universiti Putra Malaysia
Verified email at upm.edu.my - Homepage
Title
Cited by
Cited by
Year
A survey about impacts of cloud computing on digital forensics
F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin, ...
International Journal of Cyber-Security and Digital Forensics 2 (2), 77-95, 2013
622013
Digital forensic trends and future
FN Dezfoli, A Dehghantanha, R Mahmoud, NFBM Sani, F Daryabar
International Journal of Cyber-Security and Digital Forensics 2 (2), 48-77, 2013
582013
Unit testing approaches for BPEL: a systematic review
Z Zakaria, R Atan, AAA Ghani, NFM Sani
2009 16th Asia-Pacific Software Engineering Conference, 316-322, 2009
492009
Volatile memory acquisition using backup for forensic investigation
FN Dezfouli, A Dehghantanha, R Mahmoud, NFBM Sani, ...
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
352012
Towards secure model for SCADA systems
F Daryabar, A Dehghantanha, NI Udzir, S bin Shamsuddin
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
332012
S-scrum: a secure methodology for agile development of web services
D Mougouei, NFM Sani, MM Almasi
World of Computer Science and Information Technology Journal 3 (1), 15-19, 2013
322013
MRMR BA: a hybrid gene selection algorithm for cancer classification
OA Alomari, AT Khader, MA Al-Betar, LM Abualigah
J Theor Appl Inf Technol 95 (12), 2610-2618, 2017
302017
An effective security alert mechanism for real-time phishing tweet detection on Twitter
SW Liew, NFM Sani, MT Abdullah, R Yaakob, MY Sharum
Computers & Security 83, 201-207, 2019
202019
A survey on malware analysis and detection techniques
FN Dezfouli, A Dehghantanha, R Mahmod, NFBM Sani, SB Shamsuddin, ...
International Journal of Advancements in Computing Technology 5 (14), 42, 2013
142013
A survey on security awareness among social networking users in malaysia
I Ishak, F Sidi, MA Jabar, NFM Sani, A Mustapha, SR Supian
Australian Journal of Basic and Applied Sciences 6 (12), 23-29, 2012
142012
Enhance Luhn algorithm for validation of credit cards numbers
KW Hussein, NFM Sani, R Mahmod, MT Abdullah
Int. J. Comput. Sci. Mob. Comput 2 (7), 262-272, 2013
132013
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network
S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah
IEEE Access 8, 70651-70663, 2020
112020
SEMANTIC SCHEMA MATCHING APPROACHES: A REVIEW.
J HOSSAIN, NORFM SANI, LS AFFENDEY, I ISHAK, KA KASMIRAN
Journal of Theoretical & Applied Information Technology 62 (1), 2014
102014
A survey on privacy impacts of digital investigation
F Daryabar, A Dehghantanha, NI Udzir, NFM Sani, S Shamsuddin, ...
Journal of Next Generation Information Technology 4 (8), 2013
92013
Cryptographic key exchange protocol with message authentication codes (mac) using finite state machine
MAM Isa, MM Ahmad, NFM Sani, H Hashim, R Mahmod
Procedia Computer Science 42, 263-270, 2014
72014
MEASURING COMPUTER SECURITY AWARENESS ON INTERNET BANKING AND SHOPPING FOR INTERNET USERS.
F SIDI, MA JABAR, A MUSTAPHA, NORF SANI, I ISHAK, SR SUPIAN
Journal of Theoretical & Applied Information Technology 53 (2), 2013
72013
A data-centric model for smartphone security
FN Dezfouli, A Dehghantanha, R Mahmod, N Sani, S bin Shamsuddin
Int. J. Adv. Comput. Technol 5 (9), 2013
72013
COMPARISON OF JAMMING EXCISION METHODS FOR DIRECT SEQUENCE/SPREAD SPECTRUM (DS/SS) MODULATED SIGNAL.
GC CARDARILLI, L DI NUNZIO, R FAZZOLARI, A FEREIDOUNTABAR, ...
Journal of Theoretical & Applied Information Technology 95 (13), 2017
62017
Mobile plant tagging system for urban forest eco-tourism using QR code
I Ishak, F Sidi, LS Affendey, NFM Sani, AS Hamzah, P Bawon
2013 International Conference on Advanced Computer Science Applications and …, 2013
62013
Design and implementation of multi factor mechanism for secure authentication system
KW Hussein, NFM Sani, R Mahmod, MT Abdullah
International Journal of Computer Science and Information Security 11 (7), 31, 2013
62013
The system can't perform the operation now. Try again later.
Articles 1–20