Follow
Nabil Ahmad Zawawi
Title
Cited by
Cited by
Year
A survey on deception techniques for securing web application
AIM Efendi, Z Ibrahim, MNA Zawawi, FA Rahim, NAM Pahri, A Ismail
2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity …, 2019
112019
A CTF-based approach in cyber security education for secondary school students
AHA Hanafi, H Rokman, AD Ibrahim, ZA Ibrahim, MNA Zawawi, FA Rahim
electronic Journal of Computer Science and Information Technology 7 (1), 2021
82021
Passive and active reconnaissance: a social engineering case study
SNH Zulkiffli, MNA Zawawi, FA Rahim
2020 8th International Conference on Information Technology and Multimedia …, 2020
82020
Motion activated security camera using Raspberry Pi: An IoT solution for room security
G Muruti, FA Rahim, MNA Zawawi
Advanced Science Letters 24 (3), 1698-1701, 2018
52018
Comparative Analysis on Student's Interest in Cyber Security among Secondary School Students using CTF Platform
ADB Ibrahim, AHA Hanafi, H Rokman, MNA Zawawi, ZA Ibrahim, ...
2020 8th International Conference on Information Technology and Multimedia …, 2020
32020
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway
QS Qassim, N Jamil, MN Mahdi, MNA Zawawi, MZ Jamaludin, R Jidin, ...
Journal of Physics: Conference Series 2261 (1), 012019, 2022
22022
Cybersecurity Risk Assessment: Modeling Factors Associated with Higher Education Institutions
R Ganesen, AA Bakar, R Ramli, FA Rahim, MNA Zawawi
International Journal of Advanced Computer Science and Applications 13 (8), 2022
22022
A review: Towards practical attack taxonomy for industrial control systems
QS Qassim, N Jamil, R Jidin, ME Rusli, MNA Zawawi, MZ Jamaludin, ...
International Journal of Engineering & Technology 7 (2.14), 145-152, 2018
12018
Effective Classroom Experience via Social Media: An Experience in UNITEN
MNA Zawawi
International Journal of Engineering & Technology 7 (4.36), 484-487, 2018
2018
ACaution IN SOCIALIZATION: APreliminary IDENTIFICATION OF PERSONAL SECURITY JEOPARDIZING HABITS AMONG SOCIAL MEDIA USERS IN MALAYSIA
MNA Zawawi
2015
A Robust Cover Generation Technique for Steganography Using 2D Images
MN Ahmad Zawawi
Universiti Putra Malaysia, 2006
2006
Organizing Comittee
ZB Hassan, YB Yusoff, AB Selamat, MDAB Suliman, MHM Zabil, ...
AN IMPLEMENTATION OF A NEAR REAL TIME DISASTER MANAGEMENT HUB BASED ON CROWDSOURCED DATA
MNA Zawawi
The system can't perform the operation now. Try again later.
Articles 1–13