default search action
CRC 2021: Langkawi Island, Malaysia
- 3rd International Cyber Resilience Conference, CRC 2021, Langkawi Island, Malaysia, January 29-31, 2021. IEEE 2021, ISBN 978-1-6654-1844-7
- Abdulrahman Sameer Sadeq, Azana Hafizah Mohd Aman, Rosilah Hassan, Hasimi Sallehudin:
Quantitative Evaluation of IEEE 802.15.4 and ISA 100.11a for large scale Wireless Sensor Network. 1-5 - Monafin Afif Fiquaro, Raja Zahilah, Siti Hajar Othman, Marina Md Arshad, Sheikh Munir Sheikh Saad:
Vaccination System using Blockchain Technology: A Prototype Development. 1-6 - Huda Osman, Maheyzah Md Siraj, Mohd Aizaini Maarof:
HAC: Model for Privacy-Preserving Outsourced Data Over Cloud. 1-4 - Teo Wen Long, Anazida Zainal, Mohd Nizam Kassim:
News Event Prediction using Causality Approach on South China Sea Conflict. 1-6 - Salman Humdullah, Siti Hajar Othman, Muhammad Najib Razali, Hazinah Kutty Mammi:
Secured Data Storage Framework for Land Registration using Blockchain Technology. 1-6 - Mohamed Mostafa Ali Montaser, Siti Hajar Othman, Raja Zahilah Raja Mohd Radzi:
Secured Tracking and Tracing System Based on Blockchain Technology. 1-6 - Sarah K. Taylor, Aswami Ariffin, Khairul Akram Zainol Ariffin, Siti Norul Huda Sheikh Abdullah:
Cryptocurrencies Investigation: A Methodology for the Preservation of Cryptowallets. 1-5 - Saeed Amer Alameri, Masnizah Mohd:
Comparison of Fake News Detection using Machine Learning and Deep Learning Techniques. 1-6 - Noor Ashitah Abu Othman, Azah Anir Norman, Miss Laiha Mat Kiah:
Information System Audit for Mobile Device Security Assessment. 1-6 - Tan Woei Ching, Azana Hafizah Mohd Aman, Wan Muhd Hazwan Azamuddin, Hasimi Sallehuddin, Zainab Senan Attarbashi:
Performance Analysis of Internet of Things Routing Protocol for Low Power and Lossy Networks (RPL): Energy, Overhead and Packet Delivery. 1-6 - Omar S. Saleh, Osman Ghazali, Norbik Bashah Idris:
A New Decentralized Certification Verification Privacy Control Protocol. 1-6 - Noor Azeera Abdul Aziz, Mohd Aizaini Maarof, Anazida Zainal:
Hate Speech and Offensive Language Detection: A New Feature Set with Filter-Embedded Combining Feature Selection. 1-6 - Nurfazrina Mohd Zamry, Anazida Zainal, Murad A. Rassam:
LEACH-CR: Energy Saving Hierarchical Network Protocol Based on Low-Energy Adaptive Clustering Hierarchy for Wireless Sensor Networks. 1-6 - Vimal Raj Silvarajoo, Shu Yun Lim, Paridah Daud:
Digital Evidence Case Management Tool for Collaborative Digital Forensics Investigation. 1-4 - Nuraqilah Haidah Ahmad Riduan, Cik Feresa Mohd Foozy, Isredza Rahmi A. Hamid, Palaniappan Shamala, Nur Fadzilah Othman:
Data Wiping Tool: ByteEditor Technique. 1-6 - Tan Woei Ching, Azana Hafizah Mohd Aman, Wan Muhd Hazwan Azamuddin, Zainab Senan Attarbashi:
Performance Evaluation of AODV Routing Protocol in MANET using NS-3 Simulator. 1-4 - Mustafa Sabah Taha, Mohammed Hashim Mahdi, Hiyam N. Khalid, Azana Hafizah Mohd Aman, Zainab Senan Attarbashi:
A Steganography Embedding Method Based on Psingle / Pdouble and Huffman Coding. 1-6 - Koh Leong Chien, Anazida Zainal, Fuad A. Ghaleb, Mohd Nizam Kassim:
Application of Knowledge-oriented Convolutional Neural Network For Causal Relation Extraction In South China Sea Conflict Issues. 1-7 - Mohammad N. Olaimat, Mohd Aizaini Maarof, Bander Ali Saleh Al-rimy:
Ransomware Anti-Analysis and Evasion Techniques: A Survey and Research Directions. 1-6 - Taj-Aldeen Naser Abdali, Rosilah Hassan, Azana Hafizah Mohd Aman:
A New Feature in Mysejahtera Application to Monitoring the Spread of COVID-19 Using Fog Computing. 1-4 - Ahmed Mahdi Jubair, Azana Hafizah Mohd Aman, Rosilah Hassan, Hasimi Sallehudin:
Dimensionality Inspection for Wireless Sensor Network Deployment using Multi-Objective Optimization. 1-5 - Umara Urooj, Mohd. Aizani Bin Maarof, Bander Ali Saleh Al-rimy:
A proposed Adaptive Pre-Encryption Crypto-Ransomware Early Detection Model. 1-6 - Rakotoasimbahoaka Antsa Cyprienna, Raharijaona Zo Lalaina Yannick, Iadaloharivola Randria, Nicolas Raft Razafindrakoto:
URL Classification based on Active Learning Approach. 1-6 - Mohd Zaki Mas'ud, Aslinda Hassan, Wahidah Md. Shah, Shekh Faisal Abdul-Latip, Rabiah Ahmad, Aswami Ariffin, Zahri Yunos:
A Review of Digital Forensics Framework for Blockchain in Cryptocurrency Technology. 1-6 - Md Arif Hassan, Zarina Shukur:
A Secure Multi Factor User Authentication Framework for Electronic Payment System. 1-6 - Nur Aizah Rosli, Siti Norul Huda Sheikh Abdullah, Ahmad Nazri Zamani, Anahita Ghazvini, Nor Sakinah Md Othman, Nor Alia Athirah Abdul Muariff Tajuddin:
Comparison Multi Transfer Learning Models for Deep Fake Image Recognizer. 1-6 - Julia Juremi, Salasiah Sulaiman, Haridasan Balakrishnan, Nurul Husna Mohd Saad:
A Secure Integrated E-Wallet Mobile Application For Education Institution. 1-6 - Ahmad Mustafa Mohamad Al-Aboosi, Samar Kamil, Siti Norul Huda Sheikh Abdullah, Khairul Akram Zainol Ariffin:
Lightweight Cryptography for Resource Constraint Devices: Challenges and Recommendation. 1-6 - Adam Khalid, Anazida Zainal, Mohd Aizaini Maarof, Fuad A. Ghaleb:
Advanced Persistent Threat Detection: A Survey. 1-6 - Shaila Sharmin, Hafizah Mansor:
Intrusion Detection on the In-Vehicle Network Using Machine Learning. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.