A H Azni
Cited by
Cited by
Performance analysis of routing protocol for WSN using data centric approach
AH Azni, MM Saudi, A Azman, AS Johari
World Academy of Science, Engineering and Technology 53, 2009
Correlated node behavior model based on semi Markov process for MANETS
AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin
arXiv preprint arXiv:1203.4319, 2012
Bluetooth mobile advertising system using pull-based approach
AH Halim, AH Fauzi, S Tarmizi
2008 International Symposium on Information Technology 4, 1-4, 2008
Analysis of Packets Abnormalities in Wireless Sensor Network
AH Azni, A Azman, MM Saudi, AH Fauzi, DNFA Iskandar
2009 Fifth International Conference on MEMS NANO, and Smart Systems, 259-264, 2009
Denial of service:(DoS) Impact on sensors
M Daud, R Rasiah, M George, D Asirvatham, AFA Rahman, A Ab Halim
2018 4th International Conference on Information Management (ICIM), 270-274, 2018
Systematic review for network survivability analysis in MANETS
AH Azni, R Ahmad, ZAM Noh, F Hazwani, N Hayaati
Procedia-Social and Behavioral Sciences 195, 1872-1881, 2015
Epidermic modelling for correlated node behavior in ad hoc networks
AH Azni, R Ahmad, ZAM Noh, ASH Basari, B Hussin
International Journal of Chaotic Computing 1 (1), 22-30, 2013
MAC protocol to reduce packet collision in wireless sensor network
AHA Halim, K Zen
2008 International Conference on Computer and Communication Engineering …, 2008
Extracting software features from online reviews to demonstrate requirements reuse in software engineering
NH Bakar, ZM Kasirun, N Salleh, AH Halim
Survivability modeling and analysis of mobile ad hoc network with correlated node behavior
AH Azni, R Ahmad, ZAM Noh
Procedia Engineering 53, 435-440, 2013
Factors influencing knowledge sharing in higher learning
AH Azni, AA Baker, N Shah, H Abd Hamid
2010 International Symposium on Information Technology 3, 1606-1609, 2010
The adaptive multi-level phase coding method in audio steganography
AA Alsabhany, F Ridzuan, AH Azni
IEEE Access 7, 129291-129306, 2019
An overview of STAKCERT framework in confronting worms attack
MM Saudi, AJ Cullen, ME Woodward, HA Hamid, AH Abhalim
2009 2nd IEEE International Conference on Computer Science and Information …, 2009
Visual perception games for autistic learners: Research findings
F Shahbodin, CKNCK Mohd, AH Azni, Z Jano
Proceedings of the 2019 Asia Pacific Information Technology Conference, 56-60, 2019
An efficient network security system through an ontology approach
AH Azni, MM Saudi, A Azman, EM Tamil, MYI Idris
2008 International Conference on Innovations in Information Technology, 267-271, 2008
Measuring sensor to cloud energy consumption
AFA Rahman, AA Halim, NHM Alwi, KS Alwi, FA Mohamad, MN Taufiq, ...
Proceedings of the 2018 2nd High Performance Computing and Cluster …, 2018
Correlated topology control algorithm for survival network in MANETS
AH Azni, R Ahmad, K Seman, NHM Alwi, ZAM Noh
Advanced Computer and Communication Engineering Technology, 93-102, 2016
Correlated node behavior in wireless ad hoc networks: an epidemic model
AH Azni, R Ahmad, ZAM Noh
2012 International Conference for Internet Technology and Secured …, 2012
A., AzreenAzman, and AriffSyahJohari,“Performance Analysis of Routing Protocol for WSN Using Data Centric Approach,”
A Azni, MM Saudi, AzreenAzman, AriffSyahJohari
International Journal of Electrical and Computer Engineering 5 (4), 208-211, 2010
Randomness Analysis on RECTANGLE Block Cipher
AA Zakaria, AH Azni, F Ridzuan, NH Zakaria, M Daud
7th International Cryptology and Information Security Conference 2020 …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20