The impact of big data on firm performance in hotel industry E Yadegaridehkordi, M Nilashi, L Shuib, MHNBM Nasir, S Asadi, ... Electronic Commerce Research and Applications 40, 100921, 2020 | 150 | 2020 |
Predicting NDUM student's academic performance using data mining techniques M Wook, YH Yahaya, N Wahab, MRM Isa, NF Awang, HY Seong 2009 Second International Conference on Computer and Electrical Engineering …, 2009 | 120 | 2009 |
Detecting vulnerabilities in web applications using automated black box and manual penetration testing NF Awang, AA Manaf International Conference on Security of Information and Communication …, 2013 | 17 | 2013 |
RapidMiner and machine learning techniques for classifying aircraft data S Marzukhi, N Awang, SN Alsagoff, H Mohamed Journal of Physics: Conference Series 1997 (1), 012012, 2021 | 12 | 2021 |
Automated security testing framework for detecting SQL injection vulnerability in web application NF Awang, AA Manaf Global Security, Safety and Sustainability: Tomorrow's Challenges of Cyber …, 2015 | 11 | 2015 |
Trusted computing-opportunities & risks NFB Awang 2009 5th International Conference on Collaborative Computing: Networking …, 2009 | 7 | 2009 |
Method of search and rescue in dipterocarp forest using GPS technology NWB Zailan, SN Alsagoff, NF Awang, MA Mohd Shukran Advanced materials research 626, 195-199, 2013 | 6 | 2013 |
Security and threats in the internet of things based smart home NF Awang, AFIM Zainudin, S Marzuki, SN Alsagoff, T Tajuddin, AD Jarno International Conference of Reliable Information and Communication …, 2020 | 5 | 2020 |
‘Estudio de dos tipos de fertilizantes químicos y orgánicos en dos híbridos comerciales de pimiento (Capsicum annun L.) en la parte alta de la Cuenca del Río Guayas,’ M Aazam, E Huh, G Abdul-Salaam, AH Abdullah, MH Anisi, A Gani, ... Univ. TÉCNICA ESTATAL QUEVEDO Fac. CIENCIAS Agrar. Esc. Ing. AGRONÓMICA, 2015 | 5 | 2015 |
A survey on conducting vulnerability assessment in web-based application NF Awang, AA Manaf, WS Zainudin International Conference on Advanced Machine Learning Technologies and …, 2014 | 4 | 2014 |
Web Vulnerability Assessment: Outsource dilemmas A Ahmad, SR Ahmad, NF Awang, ZM Ali Proceedings of the 2011 International Conference on Electrical Engineering …, 2011 | 3 | 2011 |
Preventing web browser from cyber attack NF Awang, A Ahmad, SR Ahmad GSTF Journal on Computing (JoC) 2 (1), 2014 | 2 | 2014 |
Crime Suspect Profiling (CSP) for Forensic Investigation on Smartphone T Tajuddin, A Abd Manaf, NF Awang, SRM Dawam, NR Ali, R Amat 2019 4th International Conference and Workshops on Recent Advances and …, 2019 | 1 | 2019 |
Method for generating test data for detecting sql injection vulnerability in web application NF Awang, AD Jarno, S Marzuki, NAA Jamaludin, K Abd Majid, ... 2019 7th International Conference on Cyber and IT Service Management (CITSM …, 2019 | 1 | 2019 |
A vulnerability detection framework for IoT devices: Smart lock AFIM Zainudin, NF Awang, S Marzukhi, SN Alsagoff, T Tajuddin, AD Jarno AIP Conference Proceedings 2617 (1), 2022 | | 2022 |
Framework Of Malay Intelligent Autonomous Helper (Min@ H): Text, Speech And Knowledge Dimension Towards Artificial Wisdom For Future Military Training System S Marzukhi, Z Zainol, H Muhamed, NF Awang, TM bin Tengku Sembok, ... 2019 1st International Conference on Artificial Intelligence and Data …, 2019 | | 2019 |
The Design of Promoting Building Energy Saver with Mobile Controller NAA Jamaludin, A Ahmad, NF Awang, Z Zainol International Journal of Engineering & Technology 7 (4.29), 213-215, 2018 | | 2018 |
Development of a single honeypot system interface SR Ahmad, A Ahmad, NNA Abd Hamid, A Rajab, M Sharif, NF Awang, ... | | 2011 |
Customizing GINA for authentication in virtualization SR Ahmad, A Ahmad, NF Awang, NNAN Ghazali 2010 International Symposium on Information Technology 2, 597-600, 2010 | | 2010 |
Trusted computing: Challenges & solutions NF Awang | | 2009 |