The definition and characteristics of ubiquitous learning: A discussion S Yahya, E Ahmad, K Abd Jalil International Journal of Education and Development using ICT 6 (1), 2010 | 409 | 2010 |
Comparison of machine learning algorithms performance in detecting network intrusion K Abd Jalil, MH Kamarudin, MN Masrek 2010 international conference on networking and information technology, 221-226, 2010 | 86 | 2010 |
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack G Buja, KB Abd Jalil, FBHM Ali, TFA Rahman 2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014 | 38 | 2014 |
A method for web application vulnerabilities detection by using Boyer-Moore string matching algorithm AZM Saleh, NA Rozali, AG Buja, KA Jalil, FHM Ali, TFA Rahman Procedia Computer Science 72, 112-121, 2015 | 33 | 2015 |
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks FBM Nor, K Abd Jalil Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 29 | 2012 |
Securing routing table update in AODV routing protocol K Abd Jalil, Z Ahmad, JL Ab Manan 2011 IEEE Conference on Open Systems, 116-121, 2011 | 29 | 2011 |
Mitigation of black hole attacks for aodv routing protocol KA Jalil, Z Ahmad, JA Manan International Journal of New Computer Architectures and their Applications …, 2011 | 21 | 2011 |
Looking into the 4G Features KBINABD JALIL | 19 | 2009 |
Black hole effect mitigation method in AODV routing protocol Z Ahmad, KA Jalil 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 15 | 2011 |
SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm. TFA Rahman, AG Buja, K Abd, FM Ali J. Comput. 12 (2), 183-189, 2017 | 14 | 2017 |
Achieving trust in cloud computing using secure data provenance MIM Saad, K Abd Jalil, M Manaf 2014 IEEE Conference on Open Systems (ICOS), 84-88, 2014 | 14 | 2014 |
Data provenance trusted model in cloud computing MIM Saad, K Abd Jalil, M Manaf 2013 International Conference on Research and Innovation in Information …, 2013 | 12 | 2013 |
Performance evaluation on modified AODV protocols Z Ahmad, K Abd Jalil 2012 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE), 158-163, 2012 | 9 | 2012 |
Mitigating man-in-the-browser attacks with hardware-based authentication scheme FBM Nor, K Abd Jalil International Journal of Cyber-Security and Digital Forensics 1 (3), 204-211, 2012 | 6 | 2012 |
An enhanced route discovery mechanism for aodv routing protocol KA Jalil, Z Ahmad, JLA Manan Software Engineering and Computer Systems: Second International Conference …, 2011 | 6 | 2011 |
Mind mapping with cooperative learning in supplementing computer programming learning: theoretical framework MN Ismail, KA Jalil MASAUM Journal of Basic and Applied Sciences 1 (3), 497-503, 2009 | 5 | 2009 |
The embedding of Arabic characters in QR code MFI Kamil, K Abd Jalil 2012 IEEE Conference on Open Systems, 1-5, 2012 | 3 | 2012 |
Authenticating devices in ubiquitous computing environment K Abd Jalil, QBA Rahman International Journal of Cyber-Security and Digital Forensics 1 (2), 75-82, 2012 | 3 | 2012 |
Remote user authentication scheme with hardware-based attestation FB Mat Nor, K Abd Jalil, J Ab Manan Software Engineering and Computer Systems: Second International Conference …, 2011 | 3 | 2011 |
Signalling Cost Analysis of PDE-NEMO KBINABD JALIL | 3 | 2009 |