Zakiah Zulkefli
Zakiah Zulkefli
Verified email at
Cited by
Cited by
Security and privacy risks awareness for bring your own device (BYOD) paradigm
MM Singh, CW Chan, Z Zulkefli
International Journal of Advanced Computer Science and Applications 8 (2), 53-62, 2017
Advanced Persistent Threat Mitigation Using Multi Level Security–Access Control Framework
Z Zulkefli, MM Singh, NHAH Malim
International Conference on Computational Science and Its Applications, 90-105, 2015
Security strategies for hindering watering hole cyber crime attack
KA Ismail, MM Singh, N Mustaffa, P Keikhosrokiani, Z Zulkefli
Procedia Computer Science 124, 656-663, 2017
Typosquat cyber crime attack detection via smartphone
Z Zulkefli, MM Singh, ARM Shariff, A Samsudin
Procedia Computer Science 124, 664-671, 2017
Sentient-based Access Control model: A mitigation technique for Advanced Persistent Threats in Smartphones
Z Zulkefli, MM Singh
Journal of Information Security and Applications 51, 102431, 2020
The “bring your own device”(BYOD) security metrics taxonomy
Z Zulkefli, MM Singh
Advanced Science Letters 24 (11), 8582-8590, 2018
GPU implementation of Turbo Similarity Searching using binary and fragment occurrence descriptors
ZB Zulkefli, NHAH Malim, MH Al-Laila
2016 3rd International Conference on Computer and Information Sciences …, 2016
The system can't perform the operation now. Try again later.
Articles 1–7