Exploring big data traits and data quality dimensions for big data analytics application using partial least squares structural equation modelling M Wook, NA Hasbullah, NM Zainudin, ZZA Jabar, S Ramli, NAM Razali, ... Journal of Big Data 8, 1-15, 2021 | 35 | 2021 |
Gap, techniques and evaluation: traffic flow prediction using machine learning and deep learning NAM Razali, N Shamsaimon, KK Ishak, S Ramli, MFM Amran, S Sukardi Journal of Big Data 8, 1-25, 2021 | 30 | 2021 |
Opinion mining technique for developing student feedback analysis system using lexicon-based approach (OMFeedback) M Wook, NAM Razali, S Ramli, NA Wahab, NA Hasbullah, NM Zainudin, ... Education and Information Technologies 25, 2549-2560, 2020 | 21 | 2020 |
Secure Blockchain-Based Data-Sharing Model and Adoption among Intelligence Communities. NAM Razali, WN Wan Muhamad, KK Ishak, NJAM Saad, M Wook, ... IAENG International Journal of Computer Science 48 (1), 2021 | 20 | 2021 |
Opinion mining for national security: techniques, domain applications, challenges and research opportunities NAM Razali, NA Malizan, NA Hasbullah, M Wook, NM Zainuddin, ... Journal of big data 8, 1-46, 2021 | 18 | 2021 |
Evaluation of blockchain-based data sharing acceptance among intelligence community WNW Muhamad, NAM Razali, M Wook, KK Ishak, NM Zainudin, ... International Journal of Advanced Computer Science and Applications 11 (12), 2020 | 15 | 2020 |
Secure biometric lock system for files and applications: a review Z Ishak, N Rajendran, OI Al-Sanjary, NAM Razali 2020 16th IEEE International Colloquium on Signal Processing & Its …, 2020 | 11 | 2020 |
Vulnerability analysis using network timestamps in full virtualization virtual machine M Noorafiza, H Maeda, R Uda, T Kinoshita, M Shiratori 2015 International Conference on Information Systems Security and Privacy …, 2015 | 11 | 2015 |
Identifying fake account in facebook using machine learning AN Hakimi, S Ramli, M Wook, N Mohd Zainudin, NA Hasbullah, ... Advances in Visual Informatics: 6th International Visual Informatics …, 2019 | 10 | 2019 |
Kansei information security assessment (KISA): characterizing trust as stimuli for user emotional assessment in information security KK Ishak, NAM Razali, AM Lokman, K Toshiyuki Indian Journal of Science and Technology 9 (41), 2016 | 10 | 2016 |
Disaster management support model for Malaysia HE Che Hamid, NJA MSaad, NA Mat Razali, MA Khairuddin, MN Ismail, ... Advances in Visual Informatics: 6th International Visual Informatics …, 2019 | 8 | 2019 |
Virtual machine remote detection method using network timestamp in cloud computing M Noorafiza, H Maeda, T Kinoshita, R Uda 8th International Conference for Internet Technology and Secured …, 2013 | 8 | 2013 |
Block Length Optimization in Data Deduplication Technique M Noorafiza, I Koike, H Yamasaki, A Rizalhasrin, T Kinoshita Proceedings of the International Conference on Scientific Computing (CSC), 203, 2013 | 8 | 2013 |
Political security threat prediction framework using hybrid lexicon-based approach and machine learning technique NAM Razali, NA Malizan, NA Hasbullah, M Wook, NM Zainuddin, ... IEEE Access 11, 17151-17164, 2023 | 6 | 2023 |
Exploring and developing an industrial automation acceptance model in the manufacturing sector towards adoption of Industry 4.0 MRA Bakar, NAM Razali, M Wook, MN Ismail, TMT Sembok Manufacturing Technology 21 (4), 434-446, 2021 | 6 | 2021 |
Big data analytics application model based on data quality dimensions and big data traits in public sector NM Wook, M., Jabar, Z.Z.A., Halim, M.H., Razali, N.A.M., Ramli, S ... International Journal of Advanced Trends in Computer Science and Engineering …, 2020 | 6 | 2020 |
Queuing network approximation technique for evaluating performance of computer systems with memory resource used by multiple job types M Takaya, C Itaba, M Ogiwara, I Koike, N Matrazali, T Kinoshita Proceedings of the International Conference on Scientific Computing (CSC), 1, 2014 | 6 | 2014 |
Enhance multi-factor authentication model for intelligence community access to critical surveillance data WN Wan Muhamad, NA Mat Razali, KK Ishak, NA Hasbullah, ... Advances in Visual Informatics: 6th International Visual Informatics …, 2019 | 5 | 2019 |
Fear as emotion assessment in information security using Kansei engineering methodology NJAM Saad, MRN Afiza, KK Ishak, NA Hasbullah, NM Zainudin, S Ramli, ... Proceedings of the 7th International Conference on Kansei Engineering and …, 2018 | 5 | 2018 |
Virtual machines detection methods using IP timestamps pattern characteristic M Noorafiza, H Maeda, T Kinoshita, R Uda Intnl. Jour. Comput. Sci. Inf. Technol 8 (1), 1-15, 2016 | 5 | 2016 |