Follow
Nor Fatimah Awang, PhD
Nor Fatimah Awang, PhD
Senior Lecturer of Computer Science, Universiti Pertahanan Nasional Malaysia
Verified email at upnm.edu.my
Title
Cited by
Cited by
Year
The impact of big data on firm performance in hotel industry
E Yadegaridehkordi, M Nilashi, L Shuib, MHNBM Nasir, S Asadi, ...
Electronic Commerce Research and Applications 40, 100921, 2020
1502020
Predicting NDUM student's academic performance using data mining techniques
M Wook, YH Yahaya, N Wahab, MRM Isa, NF Awang, HY Seong
2009 Second International Conference on Computer and Electrical Engineering …, 2009
1202009
Detecting vulnerabilities in web applications using automated black box and manual penetration testing
NF Awang, AA Manaf
International Conference on Security of Information and Communication …, 2013
172013
RapidMiner and machine learning techniques for classifying aircraft data
S Marzukhi, N Awang, SN Alsagoff, H Mohamed
Journal of Physics: Conference Series 1997 (1), 012012, 2021
122021
Automated security testing framework for detecting SQL injection vulnerability in web application
NF Awang, AA Manaf
Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015
112015
Trusted computing-opportunities & risks
NFB Awang
2009 5th International Conference on Collaborative Computing: Networking …, 2009
72009
Method of search and rescue in dipterocarp forest using GPS technology
NWB Zailan, SN Alsagoff, NF Awang, MA Mohd Shukran
Advanced materials research 626, 195-199, 2013
62013
Security and threats in the internet of things based smart home
NF Awang, AFIM Zainudin, S Marzuki, SN Alsagoff, T Tajuddin, AD Jarno
International Conference of Reliable Information and Communication …, 2020
52020
‘Estudio de dos tipos de fertilizantes químicos y orgánicos en dos híbridos comerciales de pimiento (Capsicum annun L.) en la parte alta de la Cuenca del Río Guayas,’
M Aazam, E Huh, G Abdul-Salaam, AH Abdullah, MH Anisi, A Gani, ...
Univ. TÉCNICA ESTATAL QUEVEDO Fac. CIENCIAS Agrar. Esc. Ing. AGRONÓMICA, 2015
52015
A survey on conducting vulnerability assessment in web-based application
NF Awang, AA Manaf, WS Zainudin
International Conference on Advanced Machine Learning Technologies and …, 2014
42014
Web Vulnerability Assessment: Outsource dilemmas
A Ahmad, SR Ahmad, NF Awang, ZM Ali
Proceedings of the 2011 International Conference on Electrical Engineering …, 2011
32011
Preventing web browser from cyber attack
NF Awang, A Ahmad, SR Ahmad
GSTF Journal on Computing (JoC) 2 (1), 2014
22014
Crime Suspect Profiling (CSP) for Forensic Investigation on Smartphone
T Tajuddin, A Abd Manaf, NF Awang, SRM Dawam, NR Ali, R Amat
2019 4th International Conference and Workshops on Recent Advances and …, 2019
12019
Method for generating test data for detecting sql injection vulnerability in web application
NF Awang, AD Jarno, S Marzuki, NAA Jamaludin, K Abd Majid, ...
2019 7th International Conference on Cyber and IT Service Management (CITSM …, 2019
12019
A vulnerability detection framework for IoT devices: Smart lock
AFIM Zainudin, NF Awang, S Marzukhi, SN Alsagoff, T Tajuddin, AD Jarno
AIP Conference Proceedings 2617 (1), 2022
2022
Framework Of Malay Intelligent Autonomous Helper (Min@ H): Text, Speech And Knowledge Dimension Towards Artificial Wisdom For Future Military Training System
S Marzukhi, Z Zainol, H Muhamed, NF Awang, TM bin Tengku Sembok, ...
2019 1st International Conference on Artificial Intelligence and Data …, 2019
2019
The Design of Promoting Building Energy Saver with Mobile Controller
NAA Jamaludin, A Ahmad, NF Awang, Z Zainol
International Journal of Engineering & Technology 7 (4.29), 213-215, 2018
2018
Development of a single honeypot system interface
SR Ahmad, A Ahmad, NNA Abd Hamid, A Rajab, M Sharif, NF Awang, ...
2011
Customizing GINA for authentication in virtualization
SR Ahmad, A Ahmad, NF Awang, NNAN Ghazali
2010 International Symposium on Information Technology 2, 597-600, 2010
2010
Trusted computing: Challenges & solutions
NF Awang
2009
The system can't perform the operation now. Try again later.
Articles 1–20