Search Results - Maarop N.
- Showing 1 - 16 results of 16
-
1
A Review of Factors Influencing Patient Readmission Based on Data Quality Dimension Model by Mohmad, N., Hassan, N.H., Samy, G.N., Abd. Aziz, N.S., Maarop, N., Abu Bakar, N.A.
Published 2020Get full text
Get full text
Conference or Workshop Item -
2
Digital Forensic Challenges in the Cloud Computing Environment by Samy, GN, Shanmugam, B, Maarop, N, Magalingam, P, Perumal, S, Albakri, SH
Published 2024Proceedings Paper -
3
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment by Rajoo, S, Magalingam, P, Idris, NB, Samy, GN, Maarop, N, Shanmugam, B, Perumal, S
Published 2024Proceedings Paper -
4
A Comparative Study of Text Classifier for Mobile Crowdsensing Applications by Rajoo, S, Magalingam, P, Idris, NB, Samy, GN, Maarop, N, Shanmugam, B, Perumal, S
Published 2024Proceedings Paper -
5
-
6
Proposed proactive digital forensic approach for cloud computing environment by Samy G.N., Maarop N., Wong D.H., Rahim F.A., Hassan N.H., Perumal S., Magalingam P., Albakri S.H.
Published 2023Article -
7
Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method by Samy, GN, Shanmugam, B, Maarop, N, Magalingam, P, Perumal, S, Albakri, SH, Ahmad, R
Published 2024Proceedings Paper -
8
Proposed proactive digital forensic approach for cloud computing environment by Samy G.N., Maarop N., Wong D.H., Rahim F.A., Hassan N.H., Magalingam P., Albakri S.H., Sundresan Perumal
Published 2024journal::journal article -
9
-
10
A review on risk assessment using risk prediction technique in campus network by Awang N., Samy G.A.L.N., Hassan N.H., Magalingam P.A.P., Maarop N., Perumal S.A.L.
Published 2024journal::journal article -
11
Graph Analysis Study of a City Bus Transit Network by Rahman A.S.M., Magalingam P., Kamaruddin N.B., Samy G.N., Maarop N., Perumal S.
Published 2024journal::journal article -
12
Detecting false messages in the smartphone fault reporting system by Rajoo S., Magalingam P., Samy G.N., Maarop N., Idris N.B., Shanmugam B., Sundresan Perumal
Published 2024journal::journal article -
13
-
14
Systematic Literature Review of Information Security Compliance Behaviour Theories by Kuppusamy P., Samy G.N., Maarop N., Magalingam P., Kamaruddin N., Shanmugam B., Perumal S.
Published 2024journal::journal article -
15
Novel risk assessment method to identify information security threats in cloud computing environment by Narayana Samy G., Albakri S.H., Maarop N., Magalingam P., Wong D.H.-T., Shanmugam B., Sundresan Perumal
Published 2024journal::journal article -
16
A Supervised Model to Detect Suspicious Activities in the Bitcoin Network by Al-Hashedi K.G., Magalingam P., Maarop N., Samy G.N., Rahim F.B.A., Shanmugam M., Hasan M.K.
Published 2024Conference Paper
