Get my own profile
Co-authors
- Rabiah Ahmad, Ahmad R, R AhmadInformation Security and Networking Research Group UTeM ; University Tun Hussein OnnVerified email at uthm.edu.my
- Willy SusiloAustralian Laureate Fellow, Distinguished Professor, IEEE Fellow (Comp Society), Univ of WollongongVerified email at uow.edu.au
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongVerified email at uow.edu.au
- Reza ReyhanitabarGlobal Cybersecurity Manager - Siemens Siveillance™Verified email at siemens.com
- Alya Geogiana Buja (PhD.)Universiti Teknologi MARAVerified email at uitm.edu.my
- Aslinda HassanUniversiti Teknikal Malaysia Melaka, Memorial University of NewfoundlandVerified email at utem.edu.my
- Mohd Zaki Mas'udFaculty of Information and Communication Technology, Universiti Teknikal Malaysia MelakaVerified email at utem.edu.my
- Wahidah Md ShahUniversiti Teknikal Malaysia MelakaVerified email at utem.edu.my
- Shahrin SahibUniversiti Teknikal Malaysia MelakaVerified email at utem.edu.my
- M.R.K.ARIFFINSENIOR LECTURER, UNIVERSITI PUTRA MALAYSIAVerified email at putra.upm.edu.my
- Zaheera Zainal AbidinUniversiti Teknikal Malaysia Melaka (UTeM) Optimization Modelling Analytic and Simulation (OptiMAS)Verified email at utem.edu.my
- MOHD RIZUAN BAHARONUniversiti Teknikal Malaysia Melaka, MalaysiaVerified email at utem.edu.my
- Zahri YunosUTEM
- Aswami Ariffin (Dr.A)Malaysia Research Organizations
- Kok-An PangUniversiti Teknikal Malaysia Melaka