An improved indoor positioning algorithm based on rssi-trilateration technique for internet of things (iot) ME Rusli, M Ali, N Jamil, MM Din 2016 international conference on computer and communication engineering …, 2016 | 169 | 2016 |
Blockchain consensus: An overview of alternative protocols DP Oyinloye, JS Teh, N Jamil, M Alawida Symmetry 13 (8), 1363, 2021 | 117 | 2021 |
A survey of scada testbed implementation approaches Q Qassim, N Jamil, IZ Abidin, ME Rusli, S Yussof, R Ismail, F Abdullah, ... Indian Journal of Science and Technology 10 (26), 1-8, 2017 | 56 | 2017 |
A review of security assessment methodologies in industrial control systems QS Qassim, N Jamil, M Daud, A Patel, N Ja’affar Information & Computer Security 27 (1), 47-61, 2019 | 50 | 2019 |
Construction of cryptographically strong S-boxes inspired by bee waggle dance H Isa, N Jamil, MR Z’aba New generation computing 34, 221-238, 2016 | 46 | 2016 |
Differential cryptanalysis of WARP JS Teh, A Biryukov Journal of Information Security and Applications 70, 103316, 2022 | 39* | 2022 |
Threat modeling approaches for securing cloud computin A Amini, N Jamil, AR Ahmad, MR Zaba Journal of Applied Sciences 15 (7), 953-967, 2015 | 38 | 2015 |
Determinants of cloud computing integration and its impact on sustainable performance in SMEs: An empirical investigation using the SEM-ANN approach MA Al-Sharafi, M Iranmanesh, M Al-Emran, AI Alzahrani, F Herzallah, ... Heliyon 9 (5), 2023 | 35 | 2023 |
Cybersecurity of microgrid: state-of-the-art review and possible directions of future research N Jamil, QS Qassim, FA Bohani, M Mansor, VK Ramachandaramurthy Applied Sciences 11 (21), 9812, 2021 | 34 | 2021 |
A survey of lightweight cryptographic hash function BT Hammad, N Jamil, ME Rusli, MR Z’aba Inter. J. Sci. Eng. Res 8, 806-814, 2017 | 34 | 2017 |
Recent advances in energy efficient-QoS aware MAC protocols for wireless sensor networks BA Muzakkari, MA Mohamed, MFA Kadir, Z Mohamad, N Jamil International Journal of Advanced Computer Research 8 (38), 212-228, 2018 | 30 | 2018 |
IoT honeypot: A review from researcher's perspective MF Razali, MN Razali, FZ Mansor, G Muruti, N Jamil 2018 IEEE Conference on Application, Information and Network Security (AINS …, 2018 | 28 | 2018 |
Memory forensics-based malware detection using computer vision and machine learning SSH Shah, AR Ahmad, N Jamil, AR Khan Electronics 11 (16), 2579, 2022 | 27 | 2022 |
Authenticated encryption schemes: A systematic review MA Jimale, MR Z’aba, MLBM Kiah, MYI Idris, N Jamil, MS Mohamad, ... IEEE Access 10, 14739-14766, 2022 | 27 | 2022 |
A comparative review on symmetric and asymmetric DNA-based cryptography BT Hammad, AM Sagheer, IT Ahmed, N Jamil Bulletin of Electrical Engineering and Informatics 9 (6), 2484-2491, 2020 | 27 | 2020 |
I-PRESENTTM: An Involutive Lightweight Block Cipher MR Z’aba, N Jamil, ME Rusli, MZ Jamaludin, AAM Yasir Journal of Information Security 2014, 2014 | 27 | 2014 |
Image copy-move forgery detection algorithms based on spatial feature domain IT Ahmed, BT Hammad, N Jamil 2021 IEEE 17th International colloquium on signal processing & its …, 2021 | 26 | 2021 |
Information security governance model to enhance zakat information management in Malaysian zakat institutions H Sulaiman, N Jamil Proceedings of the 6th international conference on information technology …, 2014 | 25 | 2014 |
Implementation of PRINCE algorithm in FPGA YA Abbas, R Jidin, N Jamil, MR Z'aba, ME Rusli, B Tariq Proceedings of the 6th International Conference on Information Technology …, 2014 | 24 | 2014 |
Lightweight block cipher security evaluation based on machine learning classifiers and active S-boxes TR Lee, JS Teh, N Jamil, JLS Yan, J Chen IEEE Access 9, 134052-134064, 2021 | 22 | 2021 |