Haniza Nahar
Haniza Nahar
Senior Lecturer of Faculty of Information and Communication Technology
Verified email at utem.edu.my
Title
Cited by
Cited by
Year
A framework of ipv6 network attack dataset construction by using testbed environment
M Zulkiflee, N Haniza, S Shahrin, M Ghani
Int Rev Comput Softw (IRECOS) 9 (8), 1434-1441, 2014
72014
Congestive Loss in Wireless Ad hoc Network
N Haniza, M Zulkiflee, SS Abdul, S Shahrin
World of Computer Science and Information Technology Journal (WCSIT) 1 (6 …, 2011
42011
Behavioral analysis on IPv4 malware on different platforms in IPv6 network environment
M Zulkiflee, SA Azirah, N Haniza, A Zakiah, S Shahrin
2011 IEEE Conference on Open Systems, 74-79, 2011
32011
MEDICT: A MALAY<-> ENGLISH BILINGUAL DICTIONARY FOR JAVA MOBILE PHONES
A Devaraju, H Nahar, S Marimuthu
Retrieved October 24, 2012
12012
Topology Influence on TCP Congestion Control Performance in Multi-hop Ad Hoc Wireless
N Haniza, M Khambari, S Shahrin, AMM Habbal, S Hassan
12012
Analysis on Differential Router Buffer Size towards Network Congestion
N Haniza, M Zulkiflee, SS Abdul, S Shahrin
International Journal of Computer Science and Information Security (IJCSIS …, 2011
12011
Effect of Video Encoding Scheme of Battery Consumption of Mobile Device
NAM Nawi, Z Muslim, Z Ayop, H Nahar, MA Azam
JOURNAL OF ADVANCED COMPUTING TECHNOLOGY AND APPLICATION (JACTA) 1 (1), 15-23, 2019
2019
DEVELOPMENT OF ARDUINO BASED IOT WATER-LEVEL MONITORING SYSTEM
H Nahar, A Hassan, Z Muslim
Internet of Things: Development of IoT Devices, 19, 2019
2019
Network Model Diversity for Wireless Studies
N Haniza, S Shahrin, M Zulkiflee, A Zakiah
International Journal of Information and Communication Technology Research …, 2013
2013
DITS 3722: Perlaksanaan Dan Pentadbiran Direktori Aktif
N Haniza
Faculty Of Information And Communication Technology, 2008
2008
Lab Companion for Data Communication and Networking
Z Saaya, H Nahar, A Ayop, Z Ayop
Penerbit Universiti Kolej Universiti Teknikal Kebangsaan Malaysia, 2006
2006
A Secure Memo for Mobile Application using Blowfish Encryption Technique
MS Suhaimi, H Nahar, M Zulkiflee, A Hassan
Assessing Wireless Security Implementation in Government and Private Sector Companies in Malacca-A Case Study
MFI Othman, N Bahaman, Z Muslim, H Nahar, MNM Khambari
The system can't perform the operation now. Try again later.
Articles 1–13