A cyber exercise post assessment: adoption of the Kirkpatrick model A Ahmad, C Johnson, T Storer Advances in Information Sciences and Service Sciences 7 (2), 1, 2015 | 18 | 2015 |
New method of forensic computing in a small organization S Ismail, A Ahmad, MAM Shukran Aust J Basic Appl Sci 5 (9), 2019e25, 2011 | 8 | 2011 |
A cyber exercise post assessment framework: In Malaysia perspectives A Ahmad University of Glasgow, 2016 | 7 | 2016 |
Identifying priority antecedents of educational data mining acceptance using importance-performance matrix analysis M Wook, S Ismail, NMM Yusop, SR Ahmad, A Ahmad Education and Information Technologies 24 (2), 1741-1752, 2019 | 6 | 2019 |
A New Teaching Approach in Object Oriented Programming Subject in Learning Military Environment SR Ahmad, MAM Shukran, S Ismail, A Ahmad International Journal of Digital Content Technology and its Applications 6 (15), 2012 | 5 | 2012 |
IMPLEMENTATION OF PARALLEL ALGORITHM FOR LUC CRYPTOSYSTEMS BASED ON ADDITION CHAIN BY A MESSAGE PASSING INTERFACE. Z ALI, A Ahmad Journal of Theoretical & Applied Information Technology 92 (1), 2016 | 4 | 2016 |
Web Vulnerability Assessment: Outsource dilemmas A Ahmad, SR Ahmad, NF Awang, ZM Ali Proceedings of the 2011 International Conference on Electrical Engineering …, 2011 | 3 | 2011 |
Preliminary study: Knowledge sharing in collaborative e-commerce SB Rahayuab, SF Aslah, AM Azahari, A Ahmad, ND Kamarudin 2020 8th International Conference on Information Technology and Multimedia …, 2020 | 2 | 2020 |
An Implementation Study Of Smart Library Using Beacon Bluetooth Low Energy (BLE) SB Rahayu, ND Kamarudin, AM Azahari, A Ahmad, MHM Halip Zulfaqar Journal of Defence Science, Engineering & Technology 2 (1), 2019 | 2 | 2019 |
An investigation on organisation cyber resilience A Ahmad, C Johnson, T Storer International Journal of Computer and Systems Engineering 9 (7), 1696-1701, 2015 | 2 | 2015 |
Preventing web browser from cyber attack NF Awang, A Ahmad, SR Ahmad GSTF Journal on Computing (JoC) 2 (1), 2014 | 2 | 2014 |
Design of composite materials using information technology S ZHUZBAYEV, A ADILOVA, S AKHMETZHANOVA, B JUZBAYEVA, ... Journal of Theoretical and Applied Information Technology 98 (18), 3698-3711, 2020 | 1 | 2020 |
IMPACT OF SCENARIO BASED EXERCISE ON ORGANISATION RESILIENCE IN CRITICAL INFRASTRUCTURE ORGANISATIONS A Ahmad, CW Johnson, T Storer Journal of Technology Management and Business 2 (1), 2015 | 1 | 2015 |
Improving the exchange of lessons learned in security incident reports: case studies in the privacy of electronic patient records Y He, C Johnson, Y Lyu, A Ahmad Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM …, 2014 | 1 | 2014 |
Implementation model of network security for Royal Malaysian Navy network TS Lin, A Ahmad, NAA Fataf AIP Conference Proceedings 2617 (1), 050004, 2022 | | 2022 |
Defensive programming: Developing a web application with a secure coding practices SB Rahayu, A Ahmad, SHZ Rashid AIP Conference Proceedings 2617 (1), 050006, 2022 | | 2022 |
Exploring the information security culture within industrial control systems organisations: Expert reviews S Ismail, MN Ismail, A Ahmad, MA Khairuddin AIP Conference Proceedings 2617 (1), 050005, 2022 | | 2022 |
A review on Unmanned Aerial Vehicle (UAV) threats assessments MS Ismail, A Ahmad, S Ismail, NMM Yusop AIP Conference Proceedings 2617 (1), 050007, 2022 | | 2022 |
A New Framework of Smart System For Inventory Management, Stock Item Locator And Navigation ND Kamarudin, AM Azahari, MHM Halip, SB Rahayu, A Ahmad 2021 International Conference on Computer & Information Sciences (ICCOINS …, 2021 | | 2021 |
ANDROID DESIGNED MALWARE DETECTION CHALLENGES: A FUTURE RESEARCH DIRECTION AM Azahari, A Ahmad, SB Rahayu, ND Kamarudin, MHM Halip Zulfaqar Journal of Defence Science, Engineering & Technology 4 (1), 2021 | | 2021 |