Follow
Arniyati Ahmad
Title
Cited by
Cited by
Year
A cyber exercise post assessment: adoption of the Kirkpatrick model
A Ahmad, C Johnson, T Storer
Advances in Information Sciences and Service Sciences 7 (2), 1, 2015
182015
New method of forensic computing in a small organization
S Ismail, A Ahmad, MAM Shukran
Aust J Basic Appl Sci 5 (9), 2019e25, 2011
82011
A cyber exercise post assessment framework: In Malaysia perspectives
A Ahmad
University of Glasgow, 2016
72016
Identifying priority antecedents of educational data mining acceptance using importance-performance matrix analysis
M Wook, S Ismail, NMM Yusop, SR Ahmad, A Ahmad
Education and Information Technologies 24 (2), 1741-1752, 2019
62019
A New Teaching Approach in Object Oriented Programming Subject in Learning Military Environment
SR Ahmad, MAM Shukran, S Ismail, A Ahmad
International Journal of Digital Content Technology and its Applications 6 (15), 2012
52012
IMPLEMENTATION OF PARALLEL ALGORITHM FOR LUC CRYPTOSYSTEMS BASED ON ADDITION CHAIN BY A MESSAGE PASSING INTERFACE.
Z ALI, A Ahmad
Journal of Theoretical & Applied Information Technology 92 (1), 2016
42016
Web Vulnerability Assessment: Outsource dilemmas
A Ahmad, SR Ahmad, NF Awang, ZM Ali
Proceedings of the 2011 International Conference on Electrical Engineering …, 2011
32011
Preliminary study: Knowledge sharing in collaborative e-commerce
SB Rahayuab, SF Aslah, AM Azahari, A Ahmad, ND Kamarudin
2020 8th International Conference on Information Technology and Multimedia …, 2020
22020
An Implementation Study Of Smart Library Using Beacon Bluetooth Low Energy (BLE)
SB Rahayu, ND Kamarudin, AM Azahari, A Ahmad, MHM Halip
Zulfaqar Journal of Defence Science, Engineering & Technology 2 (1), 2019
22019
An investigation on organisation cyber resilience
A Ahmad, C Johnson, T Storer
International Journal of Computer and Systems Engineering 9 (7), 1696-1701, 2015
22015
Preventing web browser from cyber attack
NF Awang, A Ahmad, SR Ahmad
GSTF Journal on Computing (JoC) 2 (1), 2014
22014
Design of composite materials using information technology
S ZHUZBAYEV, A ADILOVA, S AKHMETZHANOVA, B JUZBAYEVA, ...
Journal of Theoretical and Applied Information Technology 98 (18), 3698-3711, 2020
12020
IMPACT OF SCENARIO BASED EXERCISE ON ORGANISATION RESILIENCE IN CRITICAL INFRASTRUCTURE ORGANISATIONS
A Ahmad, CW Johnson, T Storer
Journal of Technology Management and Business 2 (1), 2015
12015
Improving the exchange of lessons learned in security incident reports: case studies in the privacy of electronic patient records
Y He, C Johnson, Y Lyu, A Ahmad
Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM …, 2014
12014
Implementation model of network security for Royal Malaysian Navy network
TS Lin, A Ahmad, NAA Fataf
AIP Conference Proceedings 2617 (1), 050004, 2022
2022
Defensive programming: Developing a web application with a secure coding practices
SB Rahayu, A Ahmad, SHZ Rashid
AIP Conference Proceedings 2617 (1), 050006, 2022
2022
Exploring the information security culture within industrial control systems organisations: Expert reviews
S Ismail, MN Ismail, A Ahmad, MA Khairuddin
AIP Conference Proceedings 2617 (1), 050005, 2022
2022
A review on Unmanned Aerial Vehicle (UAV) threats assessments
MS Ismail, A Ahmad, S Ismail, NMM Yusop
AIP Conference Proceedings 2617 (1), 050007, 2022
2022
A New Framework of Smart System For Inventory Management, Stock Item Locator And Navigation
ND Kamarudin, AM Azahari, MHM Halip, SB Rahayu, A Ahmad
2021 International Conference on Computer & Information Sciences (ICCOINS …, 2021
2021
ANDROID DESIGNED MALWARE DETECTION CHALLENGES: A FUTURE RESEARCH DIRECTION
AM Azahari, A Ahmad, SB Rahayu, ND Kamarudin, MHM Halip
Zulfaqar Journal of Defence Science, Engineering & Technology 4 (1), 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20