Kamarularifin Abd Jalil (Ass. Prof. Dr.)
Kamarularifin Abd Jalil (Ass. Prof. Dr.)
Verified email at tmsk.uitm.edu.my
Title
Cited by
Cited by
Year
The definition and characteristics of ubiquitous learning: A discussion
S Yahya, E Ahmad, KA Jalil
International Journal of Education and Development using ICT 6 (1), 2010
2752010
Comparison of machine learning algorithms performance in detecting network intrusion
KA Jalil, MH Kamarudin, MN Masrek
2010 international conference on networking and information technology, 221-226, 2010
532010
Detection model for SQL injection attack: An approach for preventing a web application from the SQL injection attack
G Buja, KBA Jalil, FBHM Ali, TFA Rahman
2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014
282014
Securing routing table update in AODV routing protocol
KA Jalil, Z Ahmad, JL Ab Manan
2011 IEEE Conference on Open Systems, 116-121, 2011
272011
An enhanced remote authentication scheme to mitigate man-in-the-browser attacks
FBM Nor, KA Jalil
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
202012
Looking into the 4G Features
K Jalil, M Latif, M Masrek
MASAUM Journal of Basic and Applied Sciences 1 (2), 249-253, 2009
192009
A method for web application vulnerabilities detection by using boyer-moore string matching algorithm
AZM Saleh, NA Rozali, AG Buja, KA Jalil, FHM Ali, TFA Rahman
Procedia Computer Science 72, 112-121, 2015
182015
Mitigation of black hole attacks for aodv routing protocol
KA Jalil, Z Ahmad, J Manan
International Journal of New Computer Architectures and their Applications …, 2011
172011
Black hole effect mitigation method in AODV routing protocol
Z Ahmad, KA Jalil
2011 7th International Conference on Information Assurance and Security (IAS …, 2011
152011
Achieving trust in cloud computing using secure data provenance
MIM Saad, KA Jalil, M Manaf
2014 IEEE Conference on Open Systems (ICOS), 84-88, 2014
142014
Data provenance trusted model in cloud computing
MIM Saad, KA Jalil, M Manaf
2013 International Conference on Research and Innovation in Information …, 2013
82013
Performance evaluation on modified AODV protocols
Z Ahmad, KA Jalil
2012 IEEE Asia-Pacific Conference on Applied Electromagnetics (APACE), 158-163, 2012
82012
SQL Injection Attack Scanner Using Boyer-Moore String Matching Algorithm.
TFA Rahman, AG Buja, K Abd, FM Ali
JCP 12 (2), 183-189, 2017
62017
An enhanced route discovery mechanism for aodv routing protocol
KA Jalil, Z Ahmad, JL Ab Manan
International Conference on Software Engineering and Computer Systems, 408-418, 2011
62011
Firearm identification using numerical features of centre firing pin impression image
NAM Ghani, SBA Kamaruddin, CY Liong, AA Jemain
2012 International Symposium on Computer Applications and Industrial …, 2012
52012
A composed energy aware metric for WSNs
KA Jalil, MH Nategh
2010 International Conference On Computer Design and Applications 2, V2-558 …, 2010
52010
Mind mapping with cooperative learning in supplementing computer programming learning: theoretical framework
MN Ismail, KA Jalil
MASAUM Journal of Basic and Applied Sciences 1 (3), 497-503, 2009
52009
Mitigating man-in-the-browser attacks with hardware-based authentication scheme
FBM Nor, KA Jalil
International Journal of Cyber-Security and Digital Forensics 1 (3), 204-211, 2012
42012
The embedding of Arabic characters in QR code
MFI Kamil, KA Jalil
2012 IEEE Conference on Open Systems, 1-5, 2012
32012
Signaling cost analysis of PDE-NEMO
KA Jalil, J Dunlop
World Congress on Science, Engineering and Technology, 25-27, 2009
32009
The system can't perform the operation now. Try again later.
Articles 1–20