Security and privacy risks awareness for bring your own device (BYOD) paradigm MM Singh, CW Chan, Z Zulkefli International Journal of Advanced Computer Science and Applications 8 (2), 2017 | 41 | 2017 |
Security strategies for hindering watering hole cyber crime attack KA Ismail, MM Singh, N Mustaffa, P Keikhosrokiani, Z Zulkefli Procedia Computer Science 124, 656-663, 2017 | 31 | 2017 |
Advanced persistent threat mitigation using multi level security–access control framework Z Zulkefli, MM Singh, NHAH Malim Computational Science and Its Applications--ICCSA 2015: 15th International …, 2015 | 22 | 2015 |
Typosquat cyber crime attack detection via smartphone Z Zulkefli, MM Singh, ARM Shariff, A Samsudin Procedia Computer Science 124, 664-671, 2017 | 21 | 2017 |
Sentient-based access control model: a mitigation technique for advanced persistent threats in smartphones Z Zulkefli, MM Singh Journal of Information Security and Applications 51, 102431, 2020 | 13 | 2020 |
The “bring your own device”(BYOD) security metrics taxonomy Z Zulkefli, MM Singh Advanced Science Letters 24 (11), 8582-8590, 2018 | 2 | 2018 |
GPU implementation of Turbo Similarity Searching using binary and fragment occurrence descriptors ZB Zulkefli, NHAH Malim, MH Al-Laila 2016 3rd International Conference on Computer and Information Sciences …, 2016 | | 2016 |