Reviewing the challenges of security features in component based software development models H Kahtan, NA Bakar, R Nordin 2012 IEEE Symposium on E-Learning, E-Management and E-Services, 1-6, 2012 | 25 | 2012 |
Dependability Attributes for increased Security in Component-based Software Development. H Kahtan, NA Bakar, R Nordin J. Comput. Sci. 10 (7), 1298-1306, 2014 | 15 | 2014 |
Awareness of Embedding Security Features into Component-based Software Development Model: a Survey. H Kahtan, NA Bakar, R Nordin J. Comput. Sci. 10 (8), 1411-1417, 2014 | 14 | 2014 |
Review of traffic control techniques for emergency vehicles WMH bin Wan Hussin, MM Rosli, R Nordin Indonesian Journal of Electrical Engineering and Computer Science 13 (3 …, 2019 | 13 | 2019 |
A mapping study on blood glucose recommender system for patients with gestational diabetes mellitus SM Rosli, MM Rosli, R Nordin Bulletin of Electrical Engineering and Informatics 8 (4), 1489-1495, 2019 | 11 | 2019 |
Issues and challenges of requirements review in the industry SO Mokhtar, R Nordin, ZA Aziz, RM Rawi Indian Journal of Science and Technology 10 (3), 1-5, 2017 | 11 | 2017 |
Evaluation dependability attributes of web application using vulnerability assessments tools H Kahtan, NA Bakar, R Nordin, MA Abdulgabber Information Technology Journal 13 (14), 2240-2249, 2014 | 8 | 2014 |
Embedding dependability attributes into component-based software development using the best practice method: A guideline H Kahtan, NA Bakar, R Nordin Journal of Applied Security Research 9 (3), 348-371, 2014 | 7 | 2014 |
Embedding dependability attributes into component-based software development H Kahtan, NA Bakar, R Nordin, MA Abdulgabber Computer Fraud & Security 2014 (11), 8-16, 2014 | 5 | 2014 |
2DCBS: A Model for Developing Dependable Component-Based Software H Kahtan, NA Bakar, R Nordin, MA Abdulgabber Preprints, 2016 | 3 | 2016 |
Designing for accountability from Islamic perspectives using value sensitive design F Ahmadon, R Nordin, R Md Rawi Malaysian Journal of Computing (MJoC) 2 (1), 1-12, 2014 | 3 | 2014 |
Feature points repeatability on facial deformation Z Paidi, R Nordin, M Manaf 2014 International Symposium on Technology Management and Emerging …, 2014 | 1 | 2014 |
Designing for privacy from Islamic perspectives using value sensitive design F Ahmadon, R Nordin, R Md Rawi | 1 | 2012 |
FRAUD&SECURITY H Kahtan, NA Bakar, MA Rosmawati Nordin, UT Abdulgabber Computer Fraud & Security, 8, 2014 | | 2014 |
Face verification without false acceptance R Nordin, MJ Nordin Malaysian Journal of Computing (MJoC) 1 (1), 15-21, 2010 | | 2010 |
Decision fusion for frontal face verification R Nordin, MJ Nordin 2008 International Symposium on Information Technology 2, 1-5, 2008 | | 2008 |
CLASSIFIER COMBINATION FOR FACE VERIFICATION R Nordin, MJ Nordin | | |