Follow
Mohd Nizam Omar
Mohd Nizam Omar
School of Computing, Universiti Utara Malaysia
Verified email at uum.edu.my
Title
Cited by
Cited by
Year
5Gbps HG 0, 1 and HG 0, 3 optical mode division multiplexing for RoFSO
A Amphawan, S Chaudhary, R Din, MN Omar
2015 IEEE 11th international colloquium on signal processing & its …, 2015
392015
An analysis of alphabet-based techniques in text steganography
B Osman, A Yasin, MN Omar
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 8 …, 2016
172016
Hybrid stepping stone detection method
MN Omar, L Siregar, R Budiarto
2008 First International Conference on Distributed Framework and …, 2008
122008
Text steganalysis using evolution algorithm approach
R Din, TZ Tuan Muda, P Lertkrai, MN Omar, A Amphawan, FA Aziz
112012
Detecting backdoor using stepping stone detection approach
K Alminshid, MN Omar
2013 Second International Conference on Informatics & Applications (ICIA), 87-92, 2013
102013
Fitness value based evolution algorithm approach for text steganalysis model
R Din, A Samsudin, TZT Muda, P Lertkrai, A Amphawan, MN Omar
International Journal of Mathematical Models and Methods in Applied Sciences …, 2013
102013
Dropped packet problems in stepping stone detection method
MN Omar, L Siregar, R Budiarto
International Journal of Computer Science & Network Security (IJCSNS) 8 (1 …, 2008
102008
Defining teamwork productivity factors in agile software development
J Iqbal, A Yasin, M Omar
Int. J. Adv. Sci. Eng. Inf. Technol 12 (3), 1160-1172, 2022
72022
The optimization of stepping stone detection: Packet capturing steps
MN Omar, MA Maarof, A Zainal
Jurnal Teknologi 44 (1), 1-14, 2006
62006
A framework of APT detection based on packets analysis and host destination
KAA Alminshid, MN Omar
Iraqi Journal of Science, 215-223, 2020
52020
An Evaluation of Page Token in OpenID Single Sign on (SSO) to Thwart Phishing Attack
NH Zakaria, MF Zainul, N Katuk, HM Tahir, MN Omar
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
52018
A detector generating algorithm for intrusion detection inspired by artificial immune system
WM Alsharafi, MN Omar
ARPN Journal of Engineering and Applied Sciences 10 (2), 608-612, 2015
52015
A performance of embedding process for text steganography method
B Osman, R Din, T Zalizam, T Muda, MN Omar
6th WSEAS World Congr. Appl. Comput. Conf.(ACC’13), 115-119, 2013
52013
A stepping stone perspective to detection of network threats
MN Omar, A Amphawan, R Din
International Journal of Applied Mathematics and Informatics 7 (3), 97-106, 2013
52013
Field evaluation on the effectiveness of a modified approach of chemical fogging against the conventional fogging in controlling dengue outbreak
M Omar, S Zaliza, M Mariappan, AO Zainal, KB Chua
The Malaysian journal of pathology 33 (2), 113, 2011
52011
Factors affecting employees' adoption of e-government in the Iraqi public education sector
K Alminshid, M Omar
Electronic Government, an International Journal 17 (2), 237-252, 2021
42021
Approach for Solving Active Perturbation Attack problem in Stepping Stone Detection
MN Omar
Universiti Sains Malaysia, 2011
42011
Quality of service performance for Xcast in IPv6 network
L Siregar, R Budiarto, MN Omar, AH Rosli
2008 First International Conference on Distributed Framework and …, 2008
42008
Normal Profile Updating Method for Enhanced Packet Header Anomaly Detection
WM Alsharafi, MN Omar, NA Al-Majmar, Y Fazea
Emerging Trends in Intelligent Computing and Informatics: Data Science …, 2020
32020
Image Features Selection Based on Computer Vision Techniques to Detect Potholes for Intelligent Transport System
M Omar, P Kumar
2021 International Conference on Information Science and Communications …, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20