Behavior of attacker and some new possible attacks in Vehicular Ad hoc Network (VANET) IA Sumra, I Ahmad, H Hasbullah, J Ab Manan Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT …, 2011 | 182 | 2011 |
Classes of attacks in VANET IA Sumra, I Ahmad, H Hasbullah, J Ab Manan Electronics, Communications and Photonics Conference (SIECPC), 2011 Saudi …, 2011 | 182* | 2011 |
Denial of service (DOS) attack and its possible solutions in VANET H Hasbullah, IA Soomro International Journal of Electronics and Communication Engineering 4 (5 …, 2010 | 134 | 2010 |
Attacks on security goals (confidentiality, integrity, availability) in VANET: a survey IA Sumra, HB Hasbullah, JB AbManan Vehicular Ad-hoc Networks for Smart Cities: First International Workshop …, 2014 | 114 | 2014 |
A study on significance of adopting cloud computing paradigm in healthcare sector M Bamiah, S Brohi, S Chuprat 2012 International Conference on Cloud Computing Technologies, Applications …, 2012 | 73 | 2012 |
A survey on security issues of federated identity in the cloud computing E Ghazizadeh, M Zamani, A Pashang 4th IEEE International Conference on Cloud Computing Technology and Science …, 2012 | 68 | 2012 |
A study on threat model for federated identities in federated identity management system ZA Khattak, S Sulaiman, JL Ab Manan 2010 International Symposium on Information Technology 2, 618-623, 2010 | 64 | 2010 |
Timing Attack in Vehicular Network IA Sumra, J Ab Manan, H Hasbullah WSEAS/NAUN International Conferences, 2011 | 45 | 2011 |
Trust and Trusted Computing in VANET IA Sumra, H Hasbullah, Jamalul-lail, Masood-ur-Rehman Computer Science Journal 1 (1), 29-51, 2011 | 42 | 2011 |
A lightweight and secure TFTP protocol for smart environment MAM Isa, NN Mohamed, H Hashim, SFS Adnan, R Mahmod 2012 International Symposium on Computer Applications and Industrial …, 2012 | 38 | 2012 |
Students’ English language proficiency and its impact on the overall student’s academic performance: An analysis and prediction using Neural Network Model PM ARSAD, N BUNIYAMIN, J AB MANAN WSEAS, 2014 | 35 | 2014 |
Trusted computing strengthens cloud authentication E Ghazizadeh, M Zamani, J Ab Manan, M Alizadeh The Scientific World Journal 2014, 2014 | 33 | 2014 |
An Enhanced Remote Authentication Scheme to Mitigate Man-In-The-Browser Attacks F Mat Nor, K Abd Jalil, J Ab Manan Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 …, 2012 | 30* | 2012 |
Securing Routing Table Update in AODV Routing Protocol K Abd Jalil, Z Ahmad, J Ab Manan 2011 IEEE Conference on Open Systems (ICOS 2011), 2011 | 30 | 2011 |
Prediction of Engineering Students' Academic Performance Using Artificial Neural Network and Linear Regression: A Comparison P Mohd Arsad, N Buniyamin, J Ab Manan IEEE 5th International Conference on Engineering Education 2013 (ICEED2013), 2013 | 29 | 2013 |
Proposed Academic Students' Performance Prediction Model: A Malaysian Case Study P Mohd Arsad, N Buniyamin, J Ab Manan, N Hamzah 3rd International Congress On Engineering Education, ICEED 2011, 2011 | 28 | 2011 |
VANET security research and development ecosystem IA Sumra, H Hasbullah, J Ab Manan National Postgraduate Conference (NPC), 2011, 1-4, 2011 | 25 | 2011 |
Mutual attestation using TPM for trusted RFID protocol MF Mubarak, S Yahya 2010 Second International Conference on Network Applications, Protocols and …, 2010 | 25 | 2010 |
Mitigation of Black Hole Attacks for AODV Routing Protocol K Abd Jalil, Z Ahmad, J Ab Manan International Journal of New Computer Architectures and their Applications …, 2011 | 24 | 2011 |
Analysis of open environment sign-in schemes-privacy enhanced & trustworthy approach ZA Khattak, JA Manan, S Sulaiman Journal of Advances in Information Technology 2 (2), 109-121, 2011 | 23 | 2011 |