Search Results - Samy, GN
- Showing 1 - 20 results of 20
-
1
A Review of Factors Influencing Patient Readmission Based on Data Quality Dimension Model by Mohmad, N., Hassan, N.H., Samy, G.N., Abd. Aziz, N.S., Maarop, N., Abu Bakar, N.A.
Published 2020Get full text
Get full text
Conference or Workshop Item -
2
Digital Forensic Challenges in the Cloud Computing Environment by Samy, GN, Shanmugam, B, Maarop, N, Magalingam, P, Perumal, S, Albakri, SH
Published 2024Proceedings Paper -
3
A Proposed False Report Identification Algorithm for a Mobile Application in the IoT Environment by Rajoo, S, Magalingam, P, Idris, NB, Samy, GN, Maarop, N, Shanmugam, B, Perumal, S
Published 2024Proceedings Paper -
4
A Comparative Study of Text Classifier for Mobile Crowdsensing Applications by Rajoo, S, Magalingam, P, Idris, NB, Samy, GN, Maarop, N, Shanmugam, B, Perumal, S
Published 2024Proceedings Paper -
5
-
6
Proposed proactive digital forensic approach for cloud computing environment by Samy G.N., Maarop N., Wong D.H., Rahim F.A., Hassan N.H., Perumal S., Magalingam P., Albakri S.H.
Published 2023Article -
7
Information Security Risk Assessment Framework for Cloud Computing Environment Using Medical Research Design and Method by Samy, GN, Shanmugam, B, Maarop, N, Magalingam, P, Perumal, S, Albakri, SH, Ahmad, R
Published 2024Proceedings Paper -
8
Transformative cyber security model for Malaysian government agencies by Perumal S., Pitchay S.A., Samy G.N., Shanmugam B., Magalingam P., Albakri S.H.
Published 2024journal::journal article -
9
Comparative studies on mobile forensic evidence extraction open source software for android phone by Sundresan Perumal, Navarathnam S., De Vosse C., Samsuddin S.B., Samy G.N.
Published 2024journal::journal article -
10
Proposed proactive digital forensic approach for cloud computing environment by Samy G.N., Maarop N., Wong D.H., Rahim F.A., Hassan N.H., Magalingam P., Albakri S.H., Sundresan Perumal
Published 2024journal::journal article -
11
A proposed tourism information accuracy assessment (TIAA) framework by Pertheban S., Samy G.N., Shanmugam B., Sundresan Perumal
Published 2024journal::journal article -
12
Healthcare employees' perception on information privacy concerns by Rahim F.A., Ismail Z., Samy G.N.
Published 2023Conference Paper -
13
-
14
Graph Analysis Study of a City Bus Transit Network by Rahman A.S.M., Magalingam P., Kamaruddin N.B., Samy G.N., Maarop N., Perumal S.
Published 2024journal::journal article -
15
Detecting false messages in the smartphone fault reporting system by Rajoo S., Magalingam P., Samy G.N., Maarop N., Idris N.B., Shanmugam B., Sundresan Perumal
Published 2024journal::journal article -
16
Preventive measures for cross site request forgery attacks on Web-based Applications by Semastin E., Azam S., Shanmugam B., Kannoorpatti K., Jonokman M., Samy G.N., Sundresan Perumal
Published 2024journal::journal article -
17
Potential measures to enhance information security compliance in the healthcare internet of things by Jeremiah P., Samy G.N., Shanmugam B., Ponkoodalingam K., Sundresan Perumal
Published 2024journal::journal article -
18
-
19
Systematic Literature Review of Information Security Compliance Behaviour Theories by Kuppusamy P., Samy G.N., Maarop N., Magalingam P., Kamaruddin N., Shanmugam B., Perumal S.
Published 2024journal::journal article -
20
A Supervised Model to Detect Suspicious Activities in the Bitcoin Network by Al-Hashedi K.G., Magalingam P., Maarop N., Samy G.N., Rahim F.B.A., Shanmugam M., Hasan M.K.
Published 2024Conference Paper
