Blockchain technology in the healthcare industry: Trends and opportunities HM Hussien, SM Yasin, NI Udzir, MIH Ninggal, S Salman Journal of Industrial Information Integration 22, 100217, 2021 | 249 | 2021 |
Privacy preserving social network data publication JH Abawajy, MIH Ninggal, T Herawan IEEE communications surveys & tutorials 18 (3), 1974-1997, 2016 | 168 | 2016 |
Blockchain-based access control scheme for secure shared personal health records over decentralised storage HM Hussien, SM Yasin, NI Udzir, MIH Ninggal Sensors 21 (7), 2462, 2021 | 50 | 2021 |
A requirement engineering model for big data software HH Altarturi, KY Ng, MIH Ninggal, ASA Nazri, AA Abd Ghani 2017 IEEE Conference on Big Data and Analytics (ICBDA), 111-117, 2017 | 42 | 2017 |
Utility-aware social network graph anonymization MIH Ninggal, JH Abawajy Journal of Network and Computer Applications 56, 137-148, 2015 | 23 | 2015 |
Privacy threat analysis of social network data MIH Ninggal, J Abawajy Algorithms and Architectures for Parallel Processing: 11th International …, 2011 | 16 | 2011 |
Attack vector analysis and privacy-preserving social network data publishing MIH Ninggal, J Abawajy 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 12 | 2011 |
Vertex re‐identification attack using neighbourhood‐pair properties J Abawajy, MIH Ninggal, T Herawan Concurrency and Computation: Practice and Experience 28 (10), 2906-2919, 2016 | 10 | 2016 |
Neighbourhood-pair attack in social network data publishing MIH Ninggal, JH Abawajy Mobile and Ubiquitous Systems: Computing, Networking, and Services: 10th …, 2014 | 10 | 2014 |
Systematic review for phonocardiography classification based on machine learning A Altaf, H Mahdin, A Mahmood, MIH Ninggal, A Altaf, I Javid International Journal of Advanced Computer Science and Applications 14 (8), 2023 | 7 | 2023 |
Character property method for Arabic text steganography with biometric multifactor authentication using liveness detection NA Roslan, NI Udzir, R Mahmod, ZA Zukarnain, MIH Ninggal, R Thabit Journal of Theoretical and Applied Information Technology 98 (24), 4140-4157, 2020 | 7 | 2020 |
Privacy threat analysis of mobile social network data publishing JH Abawajy, MIH Ninggal, ZA Aghbari, AB Darem, A Alhashmi Security and Privacy in Communication Networks: SecureComm 2017 …, 2018 | 7 | 2018 |
Temporal Trends Analysis for Dengue Outbreak and Network Threats Severity Prediction Accuracy Improvement. NM Sharef, NA Husin, KA Kasmiran, MIH Ninggal J. Digit. Inf. Manag. 17 (3), 122, 2019 | 6 | 2019 |
The Fundamental Of Feature Extraction In Speaker Recognition: A Review IH Ninggal, AM Ahmad Proceedings of the Postgraduate Annual Research Seminar, 435, 2006 | 4 | 2006 |
Trust-based Access Control Model with Quantification Method for Protecting Sensitive Attributes MR Salji, NI Udzir, MIH Ninggal, NFM Sani, H Ibrahim International Journal of Advanced Computer Science and Applications 13 (2), 2022 | 3 | 2022 |
An anomaly detection algorithm based on online learning lagrangian svm for cloud computing environment MR Salji, NI Udzir, MIH Ninggal, NFM Sani, H Ibrahim International Journal of Security and Its Applications 10 (12), 173-186, 2016 | 3 | 2016 |
Preserving utility in social network graph anonymization MIH Ninggal, JH Abawajy 2013 12th IEEE International Conference on Trust, Security and Privacy in …, 2013 | 3 | 2013 |
Smart-Contract Privacy Preservation Mechanism M Siraj, MIH Ninggal, NI Udzir, MDH Abdullah, A Asmawi EAI Endorsed Transactions on Scalable Information Systems 10 (6), 2023 | 1 | 2023 |
Blockchain for higher education in malaysia: a look into digital ASM Harithuddin, MIH Ninggal, N Samian Recent Advances and Applications in Blockchain Technology, 13, 2021 | 1 | 2021 |
SmartCoAuth: Smart-Contract privacy preservation mechanism on querying sensitive records in the cloud M Siraj, M Ninggal, IH Hj, NI Udzir, MDH Abdullah, A Asmawi arXiv preprint arXiv:2004.02543, 2020 | 1 | 2020 |