Manmeet Mahinderjit Singh
Manmeet Mahinderjit Singh
Senior Lecturer, School of Computer Sciences, University Sains Malaysia
Verified email at usm.my - Homepage
Title
Cited by
Cited by
Year
Wearable technology devices security and privacy vulnerability analysis
KW Ching, MM Singh
International Journal of Network Security & Its Applications 8 (3), 19-30, 2016
752016
Sensors-enabled smart attendance systems using NFC and RFID technologies
CB Chew, M Mahinderjit-Singh, KC Wei, TW Sheng, MH Husin, N Malim
Int. J. New Comput. Archit. their Appl 5 (1), 19-28, 2015
322015
Trust in RFID-enabled supply-chain management
M Mahinderjit-Singh, X Li
International Journal of Security and Networks 5 (2-3), 96-105, 2010
262010
SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD) MODEL
MM Singh, SS Siang, OY San, N Hashimah, AH Malim, ARM Shariff
232014
Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment
LL Bann, MM Singh, A Samsudin
Procedia Computer Science 72, 129-136, 2015
222015
Email spam detection: a method of metaclassifiers stacking
M ZhiWei, MM Singh, ZF Zaaba
The 6th international conference on computing and informatics, 750-757, 2017
172017
Usable security: Revealing end-users comprehensions on security warnings
A Amran, ZF Zaaba, MM Singh, AW Marashdih
Procedia Computer Science 124, 624-631, 2017
162017
Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map.
M Almazrooie, A Samsudin, MM Singh
JiPS 11 (2), 310, 2015
162015
Security and privacy risks awareness for bring your own device (BYOD) paradigm
MM Singh, CW Chan, Z Zulkefli
International Journal of Advanced Computer Science and Applications 8 (2), 53-62, 2017
142017
Advanced Persistent Threat Mitigation Using Multi Level Security–Access Control Framework
Z Zulkefli, MM Singh, NHAH Malim
International Conference on Computational Science and Its Applications, 90-105, 2015
142015
Habituation effects in computer security warning
A Amran, ZF Zaaba, MK Mahinderjit Singh
Information Security Journal: A Global Perspective 27 (4), 192-204, 2018
122018
Rfid-enabled smart attendance management system
M Zhi, MM Singh
Future information technology-II, 213-231, 2015
122015
Application of six-sigma for process improvement in manufacturing industries: A case study
R Hassan, M Marimuthu, M Mahinderjit-Singh
112016
Security analysis of mobile crowd sensing applications
NP Owoh, MM Singh
Applied Computing and Informatics, 2020
102020
Security strategies for hindering watering hole cyber crime attack
KA Ismail, MM Singh, N Mustaffa, P Keikhosrokiani, Z Zulkefli
Procedia Computer Science 124, 656-663, 2017
102017
Cyberbullying and a mobile game app? An initial perspective on an alternative solution
MM Singh, PJ Ng, KM Ya, MH Husin, NHAH Malim
Journal of Information Processing Systems 13 (3), 559-572, 2017
102017
Automatic annotation of unlabeled data from smartphone-based motion and location sensors
N Pius Owoh, M Mahinderjit Singh, ZF Zaaba
Sensors 18 (7), 2134, 2018
92018
Indoor-outdoor elderly caring system (notecase)
SW Soon, LT Wei, MM Singh, MH Husin
2015 International symposium on technology management and emerging …, 2015
92015
Near Field Communication (NFC) technology security vulnerabilities and countermeasures
MM Singh, K Adzman, R Hassan
International Journal of Engineering & Technology 7 (4.31), 298-305, 2018
82018
Trust framework for RFID tracking in supply chain management
M Mahinderjit-Singh, X Li
Proc of The 3rd International Workshop on RFID Technology–Concepts …, 2009
82009
The system can't perform the operation now. Try again later.
Articles 1–20