Software development life cycle AGILE vs traditional approaches YB Leau, WK Loo, WY Tham, SF Tan International Conference on Information and Network Technology 37 (1), 162-167, 2012 | 309 | 2012 |
Recent technologies, security countermeasure and ongoing challenges of Industrial Internet of Things (IIoT): A survey SF Tan, A Samsudin Sensors 21 (19), 6647, 2021 | 69 | 2021 |
A new image encryption algorithm based on single S-box and dynamic encryption step WJ Jun, TS Fun IEEE Access 9, 120596-120612, 2021 | 50 | 2021 |
A lightweight and private mobile payment protocol by using mobile network operator TS Fun, LY Beng, J Likoh, R Roslan 2008 International Conference on Computer and Communication Engineering, 162-166, 2008 | 46 | 2008 |
A survey of homomorphic encryption for outsourced big data computation TS Fun, A Samsudin KSII Transactions on Internet and Information Systems (TIIS) 10 (8), 3826-3851, 2016 | 41 | 2016 |
Lattice ciphertext-policy attribute-based encryption from ring-LWE TS Fun, A Samsudin 2015 International Symposium on Technology Management and Emerging …, 2015 | 41 | 2015 |
Security issues on banking systems MKA Ahmad, RV Rosalim, LY Beng, TS Fun International Journal of Computer Science and Information Technologies 1 (4 …, 2010 | 34 | 2010 |
Privacy in new mobile payment protocol TS Fun, LY Beng, R Roslan, HS Habeeb International Journal of Computer and Information Engineering 2 (11), 3713-3717, 2008 | 30 | 2008 |
A rule-based named-entity recognition for malay articles R Alfred, LC Leong, CK On, P Anthony, TS Fun, MNB Razali, MHA Hijazi Advanced Data Mining and Applications: 9th International Conference, ADMA …, 2013 | 28 | 2013 |
A survey of intrusion alert correlation and its design considerations L Yu Beng, S Ramadass, S Manickam, T Soo Fun IETE Technical Review 31 (3), 233-240, 2014 | 23 | 2014 |
Enhanced security of internet banking authentication with extended honey encryption (XHE) scheme SF Tan, A Samsudin Innovative Computing, Optimization and Its Applications: Modelling and …, 2018 | 22 | 2018 |
Review of mobile macro-payments schemes TS Fun, LY Beng, MN Razali Journal of Advances in Computer Networks 1 (4), 323-327, 2013 | 18 | 2013 |
Implementing the honey encryption for securing public cloud data storage E Mok, A Samsudin, SF Tan First EAI International Conference on Computer Science and Engineering, 272-280, 2017 | 17 | 2017 |
Attribute-based encryption in securing big data from post-quantum perspective: a survey ZB Jemihin, SF Tan, GC Chung Cryptography 6 (3), 40, 2022 | 13 | 2022 |
Comparison of ensemble simple feedforward neural network and deep learning neural network on phishing detection GK Soon, LC Chiang, CK On, NM Rusli, TS Fun Computational Science and Technology: 6th ICCST 2019, Kota Kinabalu …, 2020 | 13 | 2020 |
Enhanced security for public cloud storage with honey encryption TS Fun, A Samsudin, ZF Zaaba Advanced Science Letters 23 (5), 4232-4235, 2017 | 13 | 2017 |
Security issues on identity card in Malaysia YA Kee, YC Nee, LY Beng, TS Fun International Journal of Engineering and Technology 4 (5), 617, 2012 | 13 | 2012 |
Identification of conversational intent pattern using pattern-growth technique for academic chatbot S Alias, MS Sainin, T Soo Fun, N Daut Multi-disciplinary Trends in Artificial Intelligence: 13th International …, 2019 | 12 | 2019 |
Attribute based encryption—A data centric approach for securing internet of things (IoT) TS Fun, A Samsudin Advanced Science Letters 23 (5), 4219-4223, 2017 | 11 | 2017 |
A comparative study of alert correlations for intrusion detection LY Beng, S Ramadass, S Manickam, TS Fun 2013 International Conference on Advanced Computer Science Applications and …, 2013 | 10 | 2013 |