Habibah Hashim
Habibah Hashim
Verified email at salam.uitm.edu.my
Title
Cited by
Cited by
Year
BYOD: Current state and security challenges
M Eslahi, MV Naseri, H Hashim, NM Tahir, EHM Saad
2014 IEEE Symposium on Computer Applications and Industrial Electronics …, 2014
952014
A comparison of lightweight communication protocols in robotic applications
MH Amaran, NAM Noh, MS Rohmad, H Hashim
Procedia Computer Science 76, 400-405, 2015
622015
A lightweight and secure TFTP protocol for smart environment
MAM Isa, NN Mohamed, H Hashim, SFS Adnan, R Mahmod
2012 International Symposium on Computer Applications and Industrial …, 2012
47*2012
An efficient false alarm reduction approach in HTTP-based botnet detection
M Eslahi, H Hashim, NM Tahir
2013 IEEE Symposium on Computers & Informatics (ISCI), 201-205, 2013
382013
Periodicity classification of HTTP traffic to detect HTTP Botnets
M Eslahi, MS Rohmad, H Nilsaz, MV Naseri, NM Tahir, H Hashim
2015 IEEE Symposium on Computer Applications & Industrial Electronics …, 2015
302015
Identity-based trusted authentication in wireless sensor network
YM Yussoff, H Hashim, MD Baba
arXiv preprint arXiv:1207.6185, 2012
302012
A review of physical attacks and trusted platforms in wireless sensor networks
YM Yussoff, H Hashim, R Rosli, MD Baba
Procedia Engineering 41, 580-587, 2012
292012
Implementation of quality of service (QoS) in multi protocol label switching (MPLS) networks
MRA Rahimi, H Hashim, R Ab Rahman
2009 5th International Colloquium on Signal Processing & Its Applications …, 2009
272009
Thermal spray coating technology–a review
RJ Talib, S Saad, MRM Toff, H Hashim
Solid State Sci Technol 11 (1), 109-117, 2003
252003
Evaluation of reliable UDP-based transport protocols for Internet of Things (IoT)
M Masirap, MH Amaran, YM Yussoff, R Ab Rahman, H Hashim
2016 IEEE Symposium on Computer Applications & Industrial Electronics …, 2016
242016
A data collection approach for Mobile Botnet analysis and detection
M Eslahi, MR Rostami, H Hashim, NM Tahir, MV Naseri
2014 IEEE symposium on wireless technology and applications (ISWTA), 199-204, 2014
242014
An analysis and comparison for popular video encryption algorithms
MA Saleh, NM Tahir, E Hisham, H Hashim
2015 IEEE Symposium on Computer Applications & Industrial Electronics …, 2015
212015
Deploying internet protocol version 6 (ipv6) over internet protocol version 4 (ipv4) tunnel
M Samad, F Yusuf, H Hashim, M Mahfudz, M Zan
Student Conference on Research and Development, 109-112, 2002
212002
Trusted wireless sensor node platform
YM Yussoff, H Hashim
memory 3, 6, 2010
172010
Secure boot process for wireless sensor node
LH Adnan, YM Yussoff, H Hashim
2010 International Conference on Computer Applications and Industrial …, 2010
162010
Timing analysis of the lightweight AAβ encryption scheme on embedded Linux for Internet of Things
SFS Adnan, MAM Isa, H Hashim
2016 IEEE Symposium on Computer Applications & Industrial Electronics …, 2016
122016
Natural rubber-grafted with 30% poly (methylmethacrylate) characterization for application in lithium polymer battery
H Hashim, NI Adam, NHM Zaki, ZS Mahmud, CMS Said, MZA Yahya, ...
2010 International Conference on Science and Social Research (CSSR 2010 …, 2010
112010
Integrity verification architecture (IVA) based security framework for windows operating system
MAM Isa, H Hashim, R Mahmod, H Othman
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
102012
Root of trust for trusted node based-on ARM11 platform
LH Adnan, H Hashim, YM Yussoff, MU Kamaluddin
The 17th Asia Pacific Conference on Communications, 812-815, 2011
102011
An active anycast rtt-based server selection technique
HB Hashim, JA Manan
2005 13th IEEE International Conference on Networks Jointly held with the …, 2005
102005
The system can't perform the operation now. Try again later.
Articles 1–20