Search Results - Idris, MYI
- Showing 1 - 17 results of 17
-
1
Segmentation of crescent shape blood cells using circular hough transform by Rahmani, A.M., Idris, M.Y.I., Ramli, R., Arof, Hamzah
Published 2014Get full text
Get full text
Conference or Workshop Item -
2
-
3
-
4
-
5
-
6
-
7
-
8
An Efficient Network Security System through an Ontology Approach by Azni, AH, Azman, A, Tamil, EM, Idris, MYI, Madihah Mohd Saudi
Published 2024Proceedings Paper -
9
EDOWA worm classification by Madihah Mohd Saudi, Tamil, EM, Nor, SAM, Idris, MYI, Seman, K
Published 2024Proceedings Paper -
10
Worm analysis through computer simulation (WAtCoS) by Madihah Mohd Saudi, Seman, K, Tamil, EM, Idris, MYI
Published 2024Proceedings Paper -
11
An efficient network security system through an ontology approach by Azni A.H., Azman A., Tamil E.M., Idris M.Y.I., Madihah Mohd Saudi
Published 2024Conference Paper -
12
Defending worms attack through EDOWA system by Madihah Mohd Saudi, Tamil E.M., Idris M.Y.I., Seman K., Nasir L.M.
Published 2024Conference Paper -
13
Needleman wunsch implementation for SPAM/UCE inline filter by Tamil E.M., Idris M.Y.I., Thong C.M., Jali M.Z., Madihah Mohd Saudi
Published 2024Conference Paper -
14
Reverse engineering: EDOWA worm analysis and classification by Madihah Mohd Saudi, Tamil E.M., Cullen A.J., Woodward M.E., Idris M.Y.I.
Published 2024Conference Paper -
15
Authenticated Encryption Schemes: A Systematic Review by Jimale M.A., Z'Aba M.R., Kiah M.L.B.M., Idris M.Y.I., Jamil N., Mohamad M.S., Rohmad M.S.
Published 2023Review -
16
-
17
