An efficient trojan horse classification (ETC) AM Abuzaid, MM Saudi, BM Taib, ZH Abdullah International Journal of Computer Science Issues, 2013 | 24 | 2013 |
Towards a dynamic file integrity monitor through a security classification ZH Abdullah, NI Udzir, R Mahmod, K Samsudin International Journal on New Computer Architectures and Their Applications …, 2011 | 9 | 2011 |
An efficient framework to build up malware dataset MM Saudi, ZH Abdullah International Journal of Computer, Information Science and Engineering, 2013 | 7 | 2013 |
File Integrity Monitor Scheduling Based on File Security Level Classification ZH Abdullah, NI Udzir, R Mahmod, K Samsudin Software Engineering and Computer Systems, 177-189, 2011 | 7 | 2011 |
Kebolehpercayaan Maklumat Elektronik: Tinjauan Awal Terhadap Pelajar Tamhidi ZH Abdullah, HS Ariffin, S Ismail, AN Rosli Conference: 2nd International Convention of Islam, Science & Education di …, 2016 | 6 | 2016 |
Bentuk-bentuk pemalsuan dokumen menurut fiqh dan perundangan Islam di Malaysia: Satu analisa WAFBW Ismail, ZHB Abdullah, NC Amani, LHBH Hanafi, LBA Mutalib, ... The e-Journal of Sultan Alauddin Sulaiman Shah, 2015 | 6 | 2015 |
Document forensic, the fiqh and the Syariah Courts WAFW Ismail, LA Mutalib, ZH Abdullah, NC Amani, MM Khir Geografia-Malaysian Journal of Society and Space, 2015 | 6 | 2015 |
A New Efficient Credit Scoring Model For Personal Loan Using Data Mining Technique For Sustainability Management RM Sum, W Ismail, ZH Abdullah, NFMN Shah Journal of Sustainability Science and Management, 2022 | 5 | 2022 |
Study of the Availability and Awareness of E-services in Higher Education in Libya ZAE Abdelsadeq, S Ismail, ZH Abdullah Third International Conference on E-Learning and E-Technologies in Education …, 2014 | 5 | 2014 |
Kebolehpercayaan Maklumat Elektronik: Tinjauan Awal Terhadap Pelajar Tamhidi. 2nd International Convention of Islam ZH Abdullah, HS Ariffin, S Ismail, AN Rosli Science & Education. https://www. researchgate. net/publication …, 2016 | 4 | 2016 |
Designing a new model for Trojan horse detection using sequential minimal optimization M Mohd Saudi, AM Abuzaid, BM Taib, ZH Abdullah Advanced Computer and Communication Engineering Technology: Proceedings of …, 2015 | 4 | 2015 |
A survey of newsql dbmss focusing on taxonomy, comparison and open issues W Ismail, A Muhammed, ZH Abdullah, A Radman, R Hendradi, RR Afandi Journal of Computer Science & Computational Mathematics, 2021 | 3 | 2021 |
Media Sosial Semasa Pandemik S Ismail, HS Ariffin, ZH Abdullah Universiti Sains Islam Malaysia, 2020 | 3 | 2020 |
Task mapping and routing optimization for hard real-time Networks-on-Chip MNSM Sayuti, FHM Ridzuan, ZH Abdullah Bulletin of Electrical Engineering and Informatics 8 (2), 414-421, 2019 | 3 | 2019 |
User's awareness survey on 1CITIZEN program in Universiti Sains Islam Malaysia (USIM) S Ismail, ZH Abdullah, MA NH, MZ Jali Journal of Theoretical and Applied Information Technology, 2015 | 3 | 2015 |
An assessment on the password practices among students MZ Jali, S Ismail, ZH Abdullah Journal of Theoretical and Applied Information Technology, 2014 | 3 | 2014 |
Integrated-Regression and Whale Optimisation Algorithms to post stroke rehabilitation analysis: A case study for serious games W Ismail, C Grosan, ZH Abdullah, AY Aldailamy, N Zainal, R Hendradi 2021 IEEE Symposium on Computers & Informatics (ISCI), 7-12, 2021 | 2 | 2021 |
Issues and Challenges in Online Teaching and Learning during Movement Control Order (MCO) I Shaharudin, A Halimaton Sa'adiah, A Zul Hilmi INTI JOURNAL 2020 (30), 2020 | 2 | 2020 |
A study on the performances of danger theory and negative selection algorithms for mobile spam detection NF Sulaiman, MZ Jali, ZH Abdullah, S Ismail Advanced Science Letters 23 (5), 4586-4590, 2017 | 2 | 2017 |
Awareness level towards the validity and reliability of electronic information among students ZH Abdullaha, S Ismaila, AH Muradb International conference on information technology & society, 387-94, 2015 | 2 | 2015 |