Security risk assessment framework for cloud computing environments SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed Security and Communication Networks 7 (11), 2114–2124, 2014 | 111 | 2014 |
Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture ML Mat Kiah, SH Al-Bakri, AA Zaidan, BB Zaidan, M Hussain Journal of medical systems 38, 1-11, 2014 | 96 | 2014 |
Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing HO Alanazi, AA Zaidan, BB Zaidan, MLM Kiah, SH Al-Bakri Journal of Medical Systems 39 (1), 2014 | 84 | 2014 |
A review of audio based steganography and digital watermarking ML Mat Kiah, BB Zaidan, AA Zaidan, A Mohammed Ahmed, SH Al-Bakri International Journal of Physical Sciences 6 (16), 3837-3850, 2011 | 83 | 2011 |
Securing peer-to-peer mobile communications using public key cryptography: New security strategy SH Al-Bakri, MLM Kiah, AA Zaidan, BB Zaidan, GM Alam International Journal of Physical Sciences 6 (4), 930-938, 2011 | 65 | 2011 |
Digital forensic challenges in the cloud computing environment G Narayana Samy, B Shanmugam, N Maarop, P Magalingam, S Perumal, ... Recent Trends in Information and Communication Technology: Proceedings of …, 2018 | 18 | 2018 |
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael SH Al-bakri, M. L. MatKiah Scientific Research and Essays 2 (22), 2010 | 14 | 2010 |
Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing SHAB Azuan Ahmad, Bharanidharan Shanmugam, Norbik International Journal of Computer and Communication Engineering 2, 650-654, 2013 | 13 | 2013 |
Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed Jurnal Teknologi 73 (2), 85–89, 2015 | 10 | 2015 |
Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed IRICT 2014, 483-495, 2014 | 10 | 2014 |
Enhancement and implementation of network access control architecture for virtualization environments H Annuar, B Shanmugam, A Ahmad, NB Idris, SH AlBakri, GN Samy 2013 International Conference on Informatics and Creative Multimedia, 314-320, 2013 | 9 | 2013 |
Transformative cyber security model for Malaysian government agencies S Perumal, SA Pitchay, GN Samy, B Shanmugam, P Magalingam, ... International Journal of Engineering and Technology (UAE) 7 (4.15), 87-92, 2018 | 8 | 2018 |
A Case Study for the Cloud Computing Security Threats in a Governmental Organization SH Albakri, B Shanmgam, GN Samy, NB Idris, A Ahmed 2014 International Conference on Computer, Communication, and Control Technology, 2014 | 7 | 2014 |
Digital forensic investigation challenges based on cloud computing characteristics GN Samy, N Maarop, MS Abdullah, S Perumal, SH Albakri, ... International Journal of Engineering and Technology (UAE) 7 (4.15), 7-11, 2018 | 5 | 2018 |
Cloud Computing Adoption Challenges SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed Advanced Science Letters 20 (2), 546-548, 2014 | 5 | 2014 |
An implementation of secure group communication in a wireless environment MLM Kiah, B Daghighi International Journal of Computer and Electrical Engineering 4 (6), 850, 2012 | 5 | 2012 |
Information security risk assessment framework for cloud computing environment using medical research design and method GN Samy, B Shanmugam, N Maarop, P Magalingam, S Perumal, ... Advanced Science Letters 24 (1), 739-743, 2018 | 4 | 2018 |
Proposed proactive digital forensic approach for cloud computing environment GN Samy, N Maarop, D Hooi-Ten Wong, FA Rahim, NH Hassan, ... Int. J. Eng. Technol 7 (4), 12-15, 2018 | 3 | 2018 |
Novel risk assessment method to identify information security threats in cloud computing environment G Narayana Samy, SH Albakri, N Maarop, P Magalingam, DHT Wong, ... Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019 | 2 | 2019 |
Forensic Analysis Tool for Malicious Pdf Files And Shellcode Analysis A Ahmad, B Shanmugam, NB Idris, GN Samy, SH AlBakri | 2 | 2013 |