Nur Haryani Zakaria
Nur Haryani Zakaria
Senior Lecturer, School of Computing, Universiti Utara Malaysia
Verified email at
Cited by
Cited by
Shoulder surfing defence for recall-based graphical passwords
NH Zakaria, D Griffiths, S Brostoff, J Yan
Proceedings of the seventh symposium on usable privacy and security, 1-12, 2011
Workplace accident in Malaysia: most common causes and solutions
NH Zakaria, N Mansor, Z Abdullah
Business and Management Review 2 (5), 75-88, 2012
Hybrid machine learning technique for intrusion detection system
H Mohamad Tahir, W Hasan, A Md Said, NH Zakaria, N Katuk, NF Kabir, ...
A popularity based caching strategy for the future Internet
S Hassan, IU Din, A Habbal, NH Zakaria
2016 ITU Kaleidoscope: ICTs for a Sustainable World (ITU WT), 1-8, 2016
Oving K-means clustering using discretization technique in network intrusion detection system
HM Tahir, AM Said, NH Osman, NH Zakaria, PNAM Sabri, N Katuk
2016 3rd International Conference on Computer and Information Sciences …, 2016
The Effects Of Technology, Organisational, Behavioural Factors Towards Utilization Of E-Government Adoption Model By Moderating Cultural Factors
HA Riyadh, SA Alfaiza, AA Sultan
Journal of Theoretical and Applied Information Technology 97 (8), 2142-2165, 2019
Understanding common dimensions of workplace accident in Malaysia
N Mansor, NH Zakaria, Z Abdullah
Business and Management Review 1 (6), 22-33, 2011
Cryptocurrency adoption: current stage, opportunities, and open challenges
R Al-Amri, NH Zakaria, AMM Habbal, S Hassan
International journal of advanced computer research 9 (44), 293-307, 2019
Social engineering awareness game (SEAG): an empirical evaluation of using game towards improving information security awareness
AST Olanrewaju, NH Zakaria
Halal certification for tourism marketing: the attributes and attitudes of food operators in Indonesia
N Katuk, KR Ku-Mahamud, K Kayat, MNA Hamid, NH Zakaria, ...
Journal of Islamic Marketing, 2020
Security, comfort, healthcare, and energy saving: A review on biometric factors for smart home environment
TK Ghazali, NH Zakaria
Journal of Computers 29 (1), 189-208, 2018
Implementation and recent progress in cloud-based smart home automation systems
N Katuk, KR Ku-Mahamud, NH Zakaria, MA Maarof
2018 IEEE Symposium on Computer Applications & Industrial Electronics …, 2018
An overview to pre-fetching techniques for content caching of mobile applications
N Katuk, NH Zakaria
Journal of Telecommunication, Electronic and Computer Engineering 9 (2), 37-43, 2017
Can single sign-on improve password management? A focus group study
N Katuk, HM Tahir, NH Zakaria, MS Halim
Pattern Analysis, Intelligent Security and the Internet of Things, 85-93, 2015
Mobile phone sensing using the built-in camera
N Katuk, N Zakaria, KR Ku-Mahamud
International Association of Online Engineering, 2019
An evaluation of page token in OpenID Single Sign on (SSO) to thwart phishing attack
NH Zakaria, MF Zainul, N Katuk, HM Tahir, MN Omar
Journal of Telecommunication, Electronic and Computer Engineering (JTEC) 10 …, 2018
Towards designing effective security messages: Persuasive password guidelines
NH Zakaria, N Katuk
2013 International Conference on Research and Innovation in Information …, 2013
Transforming information-based agricultural portal to knowledge-based agricultural hub
F Ahmad, NH Zakaria, WRS Osman
2008 3rd International Conference on Information and Communication …, 2008
Factors Influencing Cloud Computing Adoption in Higher Education Institutions of Least Developed Countries: Evidence from Republic of Yemen
A Hussein Alghushami, NH Zakaria, Z Mat Aji
Applied Sciences 10 (22), 8098, 2020
Impact of Software Refactoring on Software Quality in the Industrial Environment: A Review of Empirical Studies
A Almogahed, M Omar, NH Zakaria
The system can't perform the operation now. Try again later.
Articles 1–20