Segui
Sameer Hasan Saif Albakri
Sameer Hasan Saif Albakri
Faculty of Computer and Information Technology, Sana'a University
Email verificata su live.utm.my
Titolo
Citata da
Citata da
Anno
Security risk assessment framework for cloud computing environments
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Security and Communication Networks 7 (11), 2114–2124, 2014
1112014
Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture
ML Mat Kiah, SH Al-Bakri, AA Zaidan, BB Zaidan, M Hussain
Journal of medical systems 38, 1-11, 2014
962014
Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing
HO Alanazi, AA Zaidan, BB Zaidan, MLM Kiah, SH Al-Bakri
Journal of Medical Systems 39 (1), 2014
842014
A review of audio based steganography and digital watermarking
ML Mat Kiah, BB Zaidan, AA Zaidan, A Mohammed Ahmed, SH Al-Bakri
International Journal of Physical Sciences 6 (16), 3837-3850, 2011
832011
Securing peer-to-peer mobile communications using public key cryptography: New security strategy
SH Al-Bakri, MLM Kiah, AA Zaidan, BB Zaidan, GM Alam
International Journal of Physical Sciences 6 (4), 930-938, 2011
652011
Digital forensic challenges in the cloud computing environment
G Narayana Samy, B Shanmugam, N Maarop, P Magalingam, S Perumal, ...
Recent Trends in Information and Communication Technology: Proceedings of …, 2018
182018
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
SH Al-bakri, M. L. MatKiah
Scientific Research and Essays 2 (22), 2010
142010
Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing
SHAB Azuan Ahmad, Bharanidharan Shanmugam, Norbik
International Journal of Computer and Communication Engineering 2, 650-654, 2013
132013
Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Jurnal Teknologi 73 (2), 85–89, 2015
102015
Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
IRICT 2014, 483-495, 2014
102014
Enhancement and implementation of network access control architecture for virtualization environments
H Annuar, B Shanmugam, A Ahmad, NB Idris, SH AlBakri, GN Samy
2013 International Conference on Informatics and Creative Multimedia, 314-320, 2013
92013
Transformative cyber security model for Malaysian government agencies
S Perumal, SA Pitchay, GN Samy, B Shanmugam, P Magalingam, ...
International Journal of Engineering and Technology (UAE) 7 (4.15), 87-92, 2018
82018
A Case Study for the Cloud Computing Security Threats in a Governmental Organization
SH Albakri, B Shanmgam, GN Samy, NB Idris, A Ahmed
2014 International Conference on Computer, Communication, and Control Technology, 2014
72014
Digital forensic investigation challenges based on cloud computing characteristics
GN Samy, N Maarop, MS Abdullah, S Perumal, SH Albakri, ...
International Journal of Engineering and Technology (UAE) 7 (4.15), 7-11, 2018
52018
Cloud Computing Adoption Challenges
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Advanced Science Letters 20 (2), 546-548, 2014
52014
An implementation of secure group communication in a wireless environment
MLM Kiah, B Daghighi
International Journal of Computer and Electrical Engineering 4 (6), 850, 2012
52012
Information security risk assessment framework for cloud computing environment using medical research design and method
GN Samy, B Shanmugam, N Maarop, P Magalingam, S Perumal, ...
Advanced Science Letters 24 (1), 739-743, 2018
42018
Proposed proactive digital forensic approach for cloud computing environment
GN Samy, N Maarop, D Hooi-Ten Wong, FA Rahim, NH Hassan, ...
Int. J. Eng. Technol 7 (4), 12-15, 2018
32018
Novel risk assessment method to identify information security threats in cloud computing environment
G Narayana Samy, SH Albakri, N Maarop, P Magalingam, DHT Wong, ...
Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019
22019
Forensic Analysis Tool for Malicious Pdf Files And Shellcode Analysis
A Ahmad, B Shanmugam, NB Idris, GN Samy, SH AlBakri
22013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20