Manmeet Mahinderjit Singh
Manmeet Mahinderjit Singh
Senior Lecturer, School of Computer Sciences, University Sains Malaysia
Verified email at usm.my - Homepage
Title
Cited by
Cited by
Year
Wearable technology devices security and privacy vulnerability analysis
KW Ching, MM Singh
International Journal of Network Security & Its Applications 8 (3), 19-30, 2016
592016
Sensors-enabled smart attendance systems using NFC and RFID technologies
CB Chew, M Mahinderjit-Singh, KC Wei, TW Sheng, MH Husin, N Malim
Int. J. New Comput. Archit. Appl 5, 19-29, 2015
312015
Trust in RFID-enabled supply-chain management
M Mahinderjit-Singh, X Li
International Journal of Security and Networks 5 (2-3), 96-105, 2010
252010
Trusted security policies for tackling advanced persistent threat via spear phishing in BYOD environment
LL Bann, MM Singh, A Samsudin
Procedia Computer Science 72, 129-136, 2015
192015
SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD) MODEL
MM Singh, SS Siang, OY San, N Hashimah, AH Malim, ARM Shariff
172014
Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map.
M Almazrooie, A Samsudin, MM Singh
JiPS 11 (2), 310, 2015
152015
Usable security: Revealing end-users comprehensions on security warnings
A Amran, ZF Zaaba, MM Singh, AW Marashdih
Procedia Computer Science 124, 624-631, 2017
142017
Email spam detection: a method of metaclassifiers stacking
M ZhiWei, MM Singh, ZF Zaaba
The 6th international conference on computing and informatics, 750-757, 2017
142017
Security and privacy risks awareness for bring your own device (BYOD) paradigm
MM Singh, CW Chan, Z Zulkefli
International Journal of Advanced Computer Science and Applications 8 (2), 53-62, 2017
132017
Advanced Persistent Threat Mitigation Using Multi Level Security–Access Control Framework
Z Zulkefli, MM Singh, NHAH Malim
International Conference on Computational Science and Its Applications, 90-105, 2015
132015
RFID-enabled smart attendance management system
M Zhi, MM Singh
Future information technology-II, 213-231, 2015
132015
Application of six-sigma for process improvement in manufacturing industries: A case study
R Hassan, M Marimuthu, M Mahinderjit-Singh
102016
Habituation effects in computer security warning
A Amran, ZF Zaaba, MK Mahinderjit Singh
Information Security Journal: A Global Perspective 27 (4), 192-204, 2018
92018
Automatic annotation of unlabeled data from smartphone-based motion and location sensors
N Pius Owoh, M Mahinderjit Singh, ZF Zaaba
Sensors 18 (7), 2134, 2018
92018
INdoor-OuTdoor Elderly CAring SystEm (NOTECASE)
SW Soon, LT Wei, MM Singh, MH Husin
2015 International Symposium on Technology Management and Emerging …, 2015
92015
Security analysis of mobile crowd sensing applications
NP Owoh, MM Singh
Applied Computing and Informatics, 2020
82020
Security strategies for hindering watering hole cyber crime attack
KA Ismail, MM Singh, N Mustaffa, P Keikhosrokiani, Z Zulkefli
Procedia Computer Science 124, 656-663, 2017
82017
Cyberbullying and a mobile game app? An initial perspective on an alternative solution
MM Singh, PJ Ng, KM Yap, MH Husin, NHAH Malim
JIPS (Journal of Information Processing Systems) 13 (3), 559-572, 2017
82017
Trust framework for RFID tracking in supply chain management
M Mahinderjit-Singh, X Li
Proc of The 3rd International Workshop on RFID Technology–Concepts …, 2009
82009
Symbolism in computer security warnings: Signal icons and signal words
NF Samsudin, ZF Zaaba, MM Singh, A Samsudin
International Journal of Advanced Computer Science and Applications (IJACSA …, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20