Follow
Kamarularifin Abd Jalil (Ass. Prof. Dr.)
Kamarularifin Abd Jalil (Ass. Prof. Dr.)
Verified email at tmsk.uitm.edu.my
Title
Cited by
Cited by
Year
The definition and characteristics of ubiquitous learning: A discussion
S Yahya, E Ahmad, K Abd Jalil
International Journal of Education and Development using ICT 6 (1), 2010
4462010
Comparison of machine learning algorithms performance in detecting network intrusion
K Abd Jalil, MH Kamarudin, MN Masrek
2010 international conference on networking and information technology, 221-226, 2010
952010
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
G Buja, KB Abd Jalil, FBHM Ali, TFA Rahman
2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014
442014
A method for web application vulnerabilities detection by using Boyer-Moore string matching algorithm
AZM Saleh, NA Rozali, AG Buja, KA Jalil, FHM Ali, TFA Rahman
Procedia Computer Science 72, 112-121, 2015
372015
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks
FBM Nor, K Abd Jalil
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
302012
Securing routing table update in AODV routing protocol
K Abd Jalil, Z Ahmad, JL Ab Manan
2011 IEEE Conference on Open Systems, 116-121, 2011
302011
Mitigation of black hole attacks for aodv routing protocol
KA Jali, Z Ahmad, JL Ab Manan
International Journal of New Computer Architectures and their Applications …, 2011
242011
SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm.
TFA Rahman, AG Buja, K Abd, FM Ali
J. Comput. 12 (2), 183-189, 2017
192017
Latif, Mohamad Noorman Masrek,“Looking Into The 4G Features”
K Abd Jalil, MH Abd
MASAUM Journal of Basic and Applied Sciences 1 (2), 249-253, 2009
192009
Achieving trust in cloud computing using secure data provenance
MIM Saad, K Abd Jalil, M Manaf
2014 IEEE Conference on Open Systems (ICOS), 84-88, 2014
152014
Black hole effect mitigation method in AODV routing protocol
Z Ahmad, KA Jalil
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
152011
Data provenance trusted model in cloud computing
MIM Saad, K Abd Jalil, M Manaf
2013 International Conference on Research and Innovation in Information …, 2013
122013
Performance evaluation on modified AODV protocols
Z Ahmad, K Abd Jalil
2012 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE), 158-163, 2012
92012
Fault Tolerance Mechanism for Software Application Through Fog Computing as Middleware
MH Naim, JM Zain, K Abd Jalil
International Journal of Computing and Digital Systems 11 (1), 45-54, 2022
62022
Mitigating man-in-the-browser attacks with hardware-based authentication scheme
FBM Nor, K Abd Jalil
International Journal of Cyber-Security and Digital Forensics 1 (3), 204-211, 2012
62012
An enhanced route discovery mechanism for aodv routing protocol
KA Jalil, Z Ahmad, JLA Manan
Software Engineering and Computer Systems: Second International Conference …, 2011
62011
Mind mapping with cooperative learning in supplementing computer programming learning: theoretical framework
MN Ismail, KA Jalil
MASAUM Journal of Basic and Applied Sciences 1 (3), 497-504, 2009
52009
The embedding of Arabic characters in QR code
MFI Kamil, K Abd Jalil
2012 IEEE Conference on Open Systems, 1-5, 2012
32012
Authenticating devices in ubiquitous computing environment
K Abd Jalil, QBA Rahman
International Journal of Cyber-Security and Digital Forensics 1 (2), 75-82, 2012
32012
Remote user authentication scheme with hardware-based attestation
FB Mat Nor, K Abd Jalil, J Ab Manan
Software Engineering and Computer Systems: Second International Conference …, 2011
32011
The system can't perform the operation now. Try again later.
Articles 1–20