Crea il mio profilo
Coautori
- Rabiah Ahmad, Ahmad R, R AhmadInformation Security and Networking Research Group UTeM ; University Tun Hussein OnnEmail verificata su uthm.edu.my
- Willy SusiloDistinguished Professor and IEEE Fellow (Computer Society), University of WollongongEmail verificata su uow.edu.au
- Jennifer SeberryProfessor, Centre for Computer and Information Security Research, University of WollongongEmail verificata su uow.edu.au
- Reza ReyhanitabarGlobal Business Cybersecurity Manager for Digital Buildings at Siemens AGEmail verificata su siemens.com
- Alya Geogiana Buja (PhD.)Universiti Teknologi MARAEmail verificata su uitm.edu.my
- Aslinda HassanUniversiti Teknikal Malaysia Melaka, Memorial University of NewfoundlandEmail verificata su utem.edu.my
- Mohd Zaki Mas'udFaculty of Information and Communication Technology, Universiti Teknikal Malaysia MelakaEmail verificata su utem.edu.my
- Wahidah Md ShahUniversiti Teknikal Malaysia MelakaEmail verificata su utem.edu.my
- Shahrin SahibUniversiti Teknikal Malaysia MelakaEmail verificata su utem.edu.my
- M.R.K.ARIFFINSENIOR LECTURER, UNIVERSITI PUTRA MALAYSIAEmail verificata su putra.upm.edu.my
- Zaheera Zainal AbidinUniversiti Teknikal Malaysia Melaka (UTeM) Optimization Modelling Analytic and Simulation (OptiMAS)Email verificata su utem.edu.my
- MOHD RIZUAN BAHARONUniversiti Teknikal Malaysia Melaka, MalaysiaEmail verificata su utem.edu.my
- Zahri YunosUTEM
- Aswami Ariffin (Dr.A)Malaysia Research Organizations
- Kok-An PangUniversiti Teknikal Malaysia Melaka