Zarina Shukur
Title
Cited by
Cited by
Year
Conceptual privacy framework for health information on wearable device
S Safavi, Z Shukur
PloS one 9 (12), e114306, 2014
692014
A design of an assessment system for UML class diagram
NH Ali, Z Shukur, S Idris
2007 International Conference on Computational Science and its Applications …, 2007
592007
Security challenges and success factors of electronic healthcare system
A Ghazvini, Z Shukur
Procedia Technology 11, 212-219, 2013
492013
Analysis of research in programming teaching tools: An initial review
SM Salleh, Z Shukur, HM Judi
Procedia-Social and Behavioral Sciences 103, 127-135, 2013
462013
Review of user authentication methods in online examination
NA Karim, Z Shukur
Asian Journal of Information Technology 14 (5), 166-175, 2015
342015
Proposed features of an online examination interface design and its optimal values
NA Karim, Z Shukur
Computers in Human Behavior 64, 414-422, 2016
322016
Assessment system for UML class diagram using notations extraction
NH Ali, Z Shukur, S Idris
International Journal on Computer Science Network Security 7, 181-187, 2007
292007
Improving Google glass security and privacy by changing the physical and software structure
S Safavi, Z Shukur
Life Science Journal 11 (5), 109-117, 2014
282014
A study of mashup as a software application development technique with examples from an end-user programming perspective
A Patel, L Na, R Latih, C Wills, Z Shukur, R Mulla
Journal of Computer Science 6 (12), 1406-1415, 2010
272010
Detecting abnormal behavior in social network websites by using a process mining technique
M Sahlabadi, RC Muniyandi, Z Shukur
Journal of Computer Science 10 (3), 393, 2014
232014
Final year supervision management system as a tool for monitoring Computer Science projects
MA Bakar, N Jailani, Z Shukur, NFM Yatim
Procedia-Social and Behavioral Sciences 18, 273-281, 2011
232011
Systematic literature review on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Procedia technology 11, 86-92, 2013
222013
MPEG-4 video transmission using distributed TDMA MAC protocol over IEEE 802.15. 4 wireless technology
NSN Ismail, F Yunus, SHS Ariffin, AA Shahidan, RA Rashid, W Embong, ...
2011 Fourth International Conference on Modeling, Simulation and Applied …, 2011
19*2011
Reviews on cybercrime affecting portable devices
S Safavi, Z Shukur, R Razali
Procedia Technology 11, 650-657, 2013
182013
Awareness training transfer and information security content development for healthcare industry
A Ghazvini, Z Shukur
International Journal of Advanced Computer Science and Applications 7 (5 …, 2016
152016
Cyber vulnerabilities on smart healthcare, review and solutions
S Safavi, AM Meer, EKJ Melanie, Z Shukur
2018 Cyber Resilience Conference (CRC), 1-5, 2018
142018
A survey on data carving in digital forensic
N Alherbawi, Z Shukur, R Sulaiman
Asian Journal of Information Technology 15 (24), 5137-5144, 2016
142016
An experimental assessment of module documentation-based testing
S Baharom, Z Shukur
Information and Software Technology 53 (7), 747-760, 2011
142011
Module documentation based testing using Grey-Box approach
S Baharom, Z Shukur
2008 International Symposium on Information Technology 2, 1-6, 2008
132008
SNL2Z: Tool for translating an informal structured software specification into formal specification
MA Sullabi, Z Shukur
American Journal of Applied Science 5, 378-384, 2008
122008
The system can't perform the operation now. Try again later.
Articles 1–20