Wearable technology devices security and privacy vulnerability analysis KW Ching, MM Singh International Journal of Network Security & Its Applications 8 (3), 19-30, 2016 | 75 | 2016 |
Sensors-enabled smart attendance systems using NFC and RFID technologies CB Chew, M Mahinderjit-Singh, KC Wei, TW Sheng, MH Husin, N Malim Int. J. New Comput. Archit. their Appl 5 (1), 19-28, 2015 | 32 | 2015 |
Trust in RFID-enabled supply-chain management M Mahinderjit-Singh, X Li International Journal of Security and Networks 5 (2-3), 96-105, 2010 | 26 | 2010 |
SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD) MODEL MM Singh, SS Siang, OY San, N Hashimah, AH Malim, ARM Shariff | 23 | 2014 |
Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment LL Bann, MM Singh, A Samsudin Procedia Computer Science 72, 129-136, 2015 | 22 | 2015 |
Email spam detection: a method of metaclassifiers stacking M ZhiWei, MM Singh, ZF Zaaba The 6th international conference on computing and informatics, 750-757, 2017 | 17 | 2017 |
Usable security: Revealing end-users comprehensions on security warnings A Amran, ZF Zaaba, MM Singh, AW Marashdih Procedia Computer Science 124, 624-631, 2017 | 16 | 2017 |
Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map. M Almazrooie, A Samsudin, MM Singh JiPS 11 (2), 310, 2015 | 16 | 2015 |
Security and privacy risks awareness for bring your own device (BYOD) paradigm MM Singh, CW Chan, Z Zulkefli International Journal of Advanced Computer Science and Applications 8 (2), 53-62, 2017 | 14 | 2017 |
Advanced Persistent Threat Mitigation Using Multi Level Security–Access Control Framework Z Zulkefli, MM Singh, NHAH Malim International Conference on Computational Science and Its Applications, 90-105, 2015 | 14 | 2015 |
Habituation effects in computer security warning A Amran, ZF Zaaba, MK Mahinderjit Singh Information Security Journal: A Global Perspective 27 (4), 192-204, 2018 | 12 | 2018 |
Rfid-enabled smart attendance management system M Zhi, MM Singh Future information technology-II, 213-231, 2015 | 12 | 2015 |
Application of six-sigma for process improvement in manufacturing industries: A case study R Hassan, M Marimuthu, M Mahinderjit-Singh | 11 | 2016 |
Security analysis of mobile crowd sensing applications NP Owoh, MM Singh Applied Computing and Informatics, 2020 | 10 | 2020 |
Security strategies for hindering watering hole cyber crime attack KA Ismail, MM Singh, N Mustaffa, P Keikhosrokiani, Z Zulkefli Procedia Computer Science 124, 656-663, 2017 | 10 | 2017 |
Cyberbullying and a mobile game app? An initial perspective on an alternative solution MM Singh, PJ Ng, KM Ya, MH Husin, NHAH Malim Journal of Information Processing Systems 13 (3), 559-572, 2017 | 10 | 2017 |
Automatic annotation of unlabeled data from smartphone-based motion and location sensors N Pius Owoh, M Mahinderjit Singh, ZF Zaaba Sensors 18 (7), 2134, 2018 | 9 | 2018 |
Indoor-outdoor elderly caring system (notecase) SW Soon, LT Wei, MM Singh, MH Husin 2015 International symposium on technology management and emerging …, 2015 | 9 | 2015 |
Near Field Communication (NFC) technology security vulnerabilities and countermeasures MM Singh, K Adzman, R Hassan International Journal of Engineering & Technology 7 (4.31), 298-305, 2018 | 8 | 2018 |
Trust framework for RFID tracking in supply chain management M Mahinderjit-Singh, X Li Proc of The 3rd International Workshop on RFID Technology–Concepts …, 2009 | 8 | 2009 |