5Gbps HG 0, 1 and HG 0, 3 optical mode division multiplexing for RoFSO A Amphawan, S Chaudhary, R Din, MN Omar 2015 IEEE 11th international colloquium on signal processing & its …, 2015 | 39 | 2015 |
An analysis of alphabet-based techniques in text steganography B Osman, A Yasin, MN Omar Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8 …, 2016 | 17 | 2016 |
Hybrid stepping stone detection method MN Omar, L Siregar, R Budiarto 2008 First International Conference on Distributed Framework and …, 2008 | 12 | 2008 |
Text steganalysis using evolution algorithm approach R Din, TZ Tuan Muda, P Lertkrai, MN Omar, A Amphawan, FA Aziz | 11 | 2012 |
Detecting backdoor using stepping stone detection approach K Alminshid, MN Omar 2013 Second International Conference on Informatics & Applications (ICIA), 87-92, 2013 | 10 | 2013 |
Fitness value based evolution algorithm approach for text steganalysis model R Din, A Samsudin, TZT Muda, P Lertkrai, A Amphawan, MN Omar International Journal of Mathematical Models and Methods in Applied Sciences …, 2013 | 10 | 2013 |
Dropped packet problems in stepping stone detection method MN Omar, L Siregar, R Budiarto International Journal of Computer Science & Network Security (IJCSNS) 8 (1 …, 2008 | 10 | 2008 |
Defining teamwork productivity factors in agile software development J Iqbal, A Yasin, M Omar Int. J. Adv. Sci. Eng. Inf. Technol 12 (3), 1160-1172, 2022 | 7 | 2022 |
The optimization of stepping stone detection: Packet capturing steps MN Omar, MA Maarof, A Zainal Jurnal Teknologi 44 (1), 1-14, 2006 | 6 | 2006 |
A framework of APT detection based on packets analysis and host destination KAA Alminshid, MN Omar Iraqi Journal of Science, 215-223, 2020 | 5 | 2020 |
An Evaluation of Page Token in OpenID Single Sign on (SSO) to Thwart Phishing Attack NH Zakaria, MF Zainul, N Katuk, HM Tahir, MN Omar Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018 | 5 | 2018 |
A detector generating algorithm for intrusion detection inspired by artificial immune system WM Alsharafi, MN Omar ARPN Journal of Engineering and Applied Sciences 10 (2), 608-612, 2015 | 5 | 2015 |
A performance of embedding process for text steganography method B Osman, R Din, T Zalizam, T Muda, MN Omar 6th WSEAS World Congr. Appl. Comput. Conf.(ACC’13), 115-119, 2013 | 5 | 2013 |
A stepping stone perspective to detection of network threats MN Omar, A Amphawan, R Din International Journal of Applied Mathematics and Informatics 7 (3), 97-106, 2013 | 5 | 2013 |
Field evaluation on the effectiveness of a modified approach of chemical fogging against the conventional fogging in controlling dengue outbreak M Omar, S Zaliza, M Mariappan, AO Zainal, KB Chua The Malaysian journal of pathology 33 (2), 113, 2011 | 5 | 2011 |
Factors affecting employees' adoption of e-government in the Iraqi public education sector K Alminshid, M Omar Electronic Government, an International Journal 17 (2), 237-252, 2021 | 4 | 2021 |
Approach for Solving Active Perturbation Attack problem in Stepping Stone Detection MN Omar Universiti Sains Malaysia, 2011 | 4 | 2011 |
Quality of service performance for Xcast in IPv6 network L Siregar, R Budiarto, MN Omar, AH Rosli 2008 First International Conference on Distributed Framework and …, 2008 | 4 | 2008 |
Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection WM Alsharafi, MN Omar, NA Al-Majmar, Y Fazea Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020 | 3 | 2020 |
Image Features Selection Based on Computer Vision Techniques to Detect Potholes for Intelligent Transport System M Omar, P Kumar 2021 International Conference on Information Science and Communications …, 2021 | 2 | 2021 |