Internet of Things (IoT) digital forensic investigation model: Top-down forensic approach methodology S Perumal, NM Norwawi, V Raman 2015 Fifth International Conference on Digital Information Processing and …, 2015 | 95 | 2015 |
A review of feature selection techniques via gene expression profiles FK Ahmad, NM Norwawi, S Deris, NH Othman 2008 International Symposium on Information Technology 2, 1-7, 2008 | 33 | 2008 |
Systematic review of web application security development model BM Shuaibu, NM Norwawi, MH Selamat, A Al-Alwani Artificial Intelligence Review 43 (2), 259-276, 2015 | 32 | 2015 |
Identifying false alarm rates for intrusion detection system with data mining FNM Sabri, NM Norwawi, K Seman IJCSNS: International Journal of Computer Science and Network Security 11 (4 …, 2011 | 32 | 2011 |
Classification of students' performance in computer programming course according to learning style NM Norwawi, SF Abdusalam, CF Hibadullah, BM Shuaibu 2009 2nd Conference on Data Mining and Optimization, 37-41, 2009 | 31 | 2009 |
Web‐based support system for flood response operation in Malaysia N Katuk, KR Ku‐Mahamud, N Norwawi, S Deris Disaster Prevention and Management: An International Journal, 2009 | 30 | 2009 |
Requirements elicitation techniques: comparative study OI Al Mrayat, N Norwawi, N Basir International Journal of Recent Development in Engineering and Technology 1 …, 2013 | 28 | 2013 |
An investigation into influence factor of student programming grade using association rule mining MFM Mohsin, MH Abd Wahab, MF Zaiyadi, NM Norwawi, CF Hibadullah International Journal of Advances in Information Sciences and Service …, 2010 | 26 | 2010 |
A simulated annealing for Tahmidi course timetabling N Basir, W Ismail, NM Norwawi Procedia Technology 11, 437-445, 2013 | 23 | 2013 |
Interacted Multiple Ant Colonies Optimization Framework: an Experimental Study of the Evaluation and the Exploration Techniques to Control the Search Stagnation. A Aljanaby, KR Ku-Mahamud, NM Norwawi Int. J. Adv. Comp. Techn. 2 (1), 78-85, 2010 | 23 | 2010 |
Mining temporal reservoir data using sliding window technique WHW Ishak, KR Ku-Mahamud, NM Norwawi CiiT International Journal of Data Mining Knowledge Engineering 3 (8), 473-478, 2011 | 18 | 2011 |
Neural network application in reservoir water level forecasting and release decision WHW Ishak, KR Ku-Mahamud, NM Norwawi International Journal of New Computer Architectures and their Applications …, 2011 | 18 | 2011 |
User oriented privacy model for social networks NY Alkeinay, NM Norwawi Procedia-Social and Behavioral Sciences 129, 191-197, 2014 | 15 | 2014 |
Modelling of reservoir water release decision using neural network and temporal pattern of reservoir water level SA Mokhtar, WHW Ishak, NM Norwawi 2014 5th International Conference on Intelligent Systems, Modelling and …, 2014 | 15 | 2014 |
Improved extreme programming methodology with inbuilt security SB Musa, NM Norwawi, MH Selamat, KY Sharif 2011 IEEE Symposium on Computers & Informatics, 674-679, 2011 | 15 | 2011 |
Intelligent failure connection algorithm for detecting internet worms MM Rasheed, NM Norwawi, O Ghazali, MM Kadhum IJCSNS 9 (5), 280, 2009 | 15 | 2009 |
Mining the student programming performance using rough set MFM Mohsin, CF Hibadullah, NM Norwawi, MH Abd Wahab 2010 IEEE International Conference on Intelligent Systems and Knowledge …, 2010 | 13 | 2010 |
Interacted multiple ant colonies optimization approach to enhance the performance of ant colony optimization algorithms A Aljanaby, KR Ku-Mahamud, NM Norwawi Computer and Information Science 3 (1), 29, 2010 | 13 | 2010 |
Secure E-commerce web development framework B Musa, NM Norwawi, MH Selamat Information Technology Journal, 2011 | 12 | 2011 |
RAMEPs: a goal-ontology approach to analyse the requirements for data warehouse systems A Taa, MS Abdullah, NM Norwawi WSEAS Transactions on Information Science and Applications 7 (2), 295-309, 2010 | 12 | 2010 |