A modified image encryption scheme based on 2D chaotic map R Kadir, R Shahril, MA Maarof International Conference on Computer and Communication Engineering (ICCCE'10 …, 2010 | 32 | 2010 |
Randomness analysis of pseudorandom bit sequences R Kadir, MA Maarof 2009 International Conference on Computer Engineering and Applications …, 2011 | 12 | 2011 |
Risk Assessment of Web Application Penetration Testing on Cross-Site Request Forgery (CSRF) Attacks and Server-Side Includes (SSI) Injections MZ Zakaria, R Kadir 2021 International Conference on Data Science and Its Applications (ICoDSA …, 2021 | 7 | 2021 |
Towards Metamodel-based Approach for Information Security Awareness Management AY Jama, MM Siraj, R Kadir 2014 International symposium on biometrics and security technologies (ISBAST …, 2014 | 6 | 2014 |
IOT real-time people counting using raspberry PI (IOT-RepCO) MM Din, NN Nordin, MM Siraj, R Kadir IOP Conference Series: Materials Science and Engineering 864 (1), 012093, 2020 | 5 | 2020 |
Security-Based BYOD Risk Assessment Metamodelling Approach. ZM Zain, SH Othman, R Kadir PACIS, 111, 2017 | 4 | 2017 |
A Comparative Statistical Analysis of Pseudorandom Bit Sequences R Kadir, MA Maarof 2009 Fifth International Conference on Information Assurance and Security 2 …, 2009 | 4 | 2009 |
Case Study and Cooperative Learning in Cryptography Course NANJ Tan, R Kadir International Journal of Innovative Computing 10 (2), 2020 | 1 | 2020 |
Integration of PCA and Levenberg-Marquardt Neural Network in Alert Correlation M Siraj, MA Maarof, S Zaiton, M Hashim, MM Din, R Kadir Icinc, 2010 | 1 | 2010 |
The implementation of competition to promote team working and thinking skills in computer network course HK Mammi, M Md Arshad, R Kadir AIP Conference Proceedings 2433 (1), 2022 | | 2022 |
Group-Based Authentication Schemes used for Machine Type Communication Devices in WSN: A Review S Ullah, R Zahilah, MM Arshad, AH Abdullah, R Kadir IOP Conference Series: Materials Science and Engineering 884 (1), 012064, 2020 | | 2020 |
Issues in Computer Security and Networking: Part 1 MM Amin, S Ibrahim, HK Mammi, PSL Ku, NBA Bakar, M Salleh, KS Lim, ... Penerbit Universiti Teknologi Malaysia, 2012 | | 2012 |
Optimization of computer labs usage in schools: a case study of smart-school M Maarof, A Ismail, M Salleh, R Kadir, A Zainal Fakulti Sains Komputer & Sumber Maklumat, 2007 | | 2007 |
Aplikasi web clipping sistem latihan praktik FSKSM UTM menggunakan PDA R Kadir Pusat Pengurusan Penyelidikan, Universiti Teknologi Malaysia, 2007 | | 2007 |
Secret Sharing Scheme for Collaborative Access System R Kadir, MA Maarof Universiti Teknologi Malaysia, 2000 | | 2000 |
Group-Based Authentication Schemes used for Machine Type Communication Devices in WSN: A Review R Kadir | | |
Prototaip Sistem Penempahan Ruang dan Kemudahan Peralatan Menggunakan Kod Quick Response di Kolej Tun Dr Ismail SAS Nasaruddin, R Kadir | | |
Siti Hajar Othman Universiti Teknologi Malaysia Raja Zahilah Raja Md. Radzi Universiti Teknologi Malaysia Bander Ali Saleh Al-Rimy Universiti Teknologi Malaysia Anazida Zainal … FA Ghaleb, R Abd Kadir, S Abd Razak, A Abd Samah, N Ibrahim, N Ithnin, ... | | |
UBIQUITOUS DATABASE IN MOBILE HEALTHCARE A ZAINAL, M KAMAT, R KADIR, MMAT DIN, PP PENYELIDIKAN | | |
Emergency Handling System M Kamat, A Zainal, R Kadir | | |