Nor Azlina Abd Rahman
1. Vijayan, S. G., Rahman, N. A. A., & Harun, K. S. (2024, January). A conceptual framework of Zigbee wireless sensor networks for safety, reliability and security improvement. In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
2. Kalaiarasu, S., Rahman, N. A. A., & Harun, K. S. (2024, January). Deepfake impact, security threats and potential preventions. In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
3. Selen, S. G. G., Rahman, N. A. A., & Harun, K. S. (2024, January). A study of wearable IoT device (smartwatch) advantages, vulnerabilities and protection. In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
4. Hong, P. C., Rahman, N. A. A., & Juremi, J. (2024, January). Web-based biometric authentication system for web applications (WBAS). In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
5. Rahman, N.A.A., & Sahota, R.S. (2024), Battle of Hackers: Web Exploitation Handbook. ISBN: 979-8877585980.
6. Yau, Z.A, Rahman, N.A.A., & Ismail, N. (2024), Cyber Security Study of "Amazon Echo" in home and organization automation, AIP conference proceedings.
Dr. Julia Juremi
1. Lik, J. C. J., Juremi, J., & Machap, K. (2024, January). De-faketection: Deepfake detection via convolutional neural network (DFT). In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
2. Hong, P. C., Rahman, N. A. A., & Juremi, J. (2024, January). Web-based biometric authentication system for web applications (WBAS). In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
3. Sulaiman, S., Karim, A.A., Juremi, J., Mansor, A.Z. (2024). Students’ Perception on the Perceived of Knowledge of the Cyber Threats Analysis Using Security Operation Centre. In: Uden, L., Liberona, D. (eds) Learning Technology for Education Challenges. LTEC 2024. Communications in Computer and Information Science, vol 2082. Springer, Cham.
Ts Dr Vinesha Selvarajah
1. Zhi, L. H., & Selvarajah, V. (2024, January). Android phone hacking and impact via androrat. In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
2. Tan, C. C., & Selvarajah, V. (2024, January). Wannacry ransomware attack: The enemy lies under your blanket. In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
3. Long, L. Z., & Selvarajah, V. (2024, January). An alternative DOS attack on windows. In AIP Conference Proceedings (Vol. 2802, No. 1). AIP Publishing.
Nor Azlina Abd Rahman
1. Ameer A. N. Alasaad, Nor Azlina Abd Rahman, Yusnita Yusof ; Intrusion Detection System for the Internet of Medical Things (IoMT), Emerging Technologies for Digital Infrastructure Development (2023) 1: 79. doi: 10.2174/9789815080957123010010.
2. Nor Azlina Abd Rahman, Chen Lik Ken, Yeo Jia Qi, (2023). Battle of Hackers CTF: A Guide to Gamified Learning - Beginner Level. ISBN: 979-8398709490.
Dr. Julia Juremi
1. Chen, L. K., Jenalis, M. H., & Juremi, J. (2023). Towards Inclusive Cybersecurity Learning: A Novice-Friendly Capture-the-Flag Onboarding Platform. Journal of Applied Technology and Innovation (e-ISSN: 2600-7304), 7(4), 60.
2. Yi, Z. L. M., & Juremi, J. (2023, January). Dezvent-Digitalizing Attendance System with 2FA and Face Recognition Implementation. In 2023 15th International Conference on Developments in eSystems Engineering (DeSE) (pp. 125-130). IEEE.
3. Khai, C. D., & Juremi, J. (2023, January). BEsafe-Validating URLs and Domains with the aid of Indicator of Compromise. In 2023 15th International Conference on Developments in eSystems Engineering (DeSE) (pp. 309-313). IEEE.
4. R. Jegatheswaran, H. A. Mohd, J. Juremi, V. Thiruchelvam and A. Y. C. Wei, "Utilization of Virtual Reality Technology in Crime Scene Investigation," 2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS), Kalaburagi, India, 2023, pp. 1-6, doi: 10.1109/ICIICS59993.2023.10421600.
Ts Dr Vinesha Selvarajah
1. Shen, K. J., & Selvarajah, V. (2023, October). The Impact of Attacking Windows Using a Backdoor Trojan. In 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT) (pp. 1-5). IEEE.
Dr. Kuruvikulam Chandrasekaran Arun
1. Munas, M., & Arun, K. C. (2023, November). Performance Evaluation of Distance Vector (RIP) and Link-State (OSPF) Routing Protocols. In 2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS) (pp. 1-5). IEEE.
2. K. C. Arun, S. Azam, A. Siddique, M. Ali and A. Hussain, "BeSafe: Air Quality Monitoring and Control with IoT," 2023 International Conference on Evolutionary Algorithms and Soft Computing Techniques (EASCT), Bengaluru, India, 2023, pp. 1-5, doi: 10.1109/EASCT59475.2023.10393689.
Best AI Website Creator