User position detection in an indoor environment GB Campus International Journal of Multimedia and Ubiquitous Engineering 8 (5), 303-312, 2013 | 28 | 2013 |
Simple rules malay stemmer SA Fadzli, AK Norsalehen, IA Syarilla, H Hasni, MSS Dhalila The International Conference on Informatics and Applications (ICIA2012), 28-35, 2012 | 25 | 2012 |
Mouse movement behavioral biometric systems N Abd Hamid, S Safei, SDM Satar, S Chuprat, R Ahmad 2011 International Conference on User Science and Engineering (i-USEr), 206-211, 2011 | 17 | 2011 |
A survey on components of virtual'umrah application N Rahim, N Abd Hamid, WMW Isa, SDM Satar, A Rozaimee The International Journal of Multimedia & Its Applications 5 (5), 17, 2013 | 16 | 2013 |
A new model for hiding text in an image using logical connective SDM Satar, NA Hamid, F Ghazali, R Muda, M Mamat International Journal of Multimedia and Ubiquitous Engineering 10 (6), 195-202, 2015 | 11 | 2015 |
Cloud-based secure healthcare framework by using enhanced ciphertext policy attribute-based encryption scheme SDM Satar, M Hussin, ZM Hanapi, MA Mohamed Int. J. Adv. Comput. Sci. Appl 12 (6), 393-399, 2021 | 10 | 2021 |
Secure image steganography using encryption algorithm SDM Satar, NA Hamid, F Ghazali, R Muda, M Mamat, PK An Annual Int'l Conference on Intelligent Computing, Computer Science …, 2016 | 8 | 2016 |
Randomized mouse movement for behavioral biometric identification N Abd Hamid, S Safei, SDM Satar, S Chuprat, R Ahmad International Journal of Interactive Digital Media 1 (2), 52-57, 2013 | 8 | 2013 |
Towards virtuous cloud data storage using access policy hiding in ciphertext policy attribute-based encryption SD Mohd Satar, M Hussin, ZM Hanapi, MA Mohamed Future Internet 13 (11), 279, 2021 | 7 | 2021 |
Mouse movement behavioral biometric for static user authentication R Muda, NA Hamid, SDM Satar, M Mohamad, NA Mahadi, F Ghazali Advanced Science Letters 23 (6), 5050-5053, 2017 | 5 | 2017 |
Data Privacy and Integrity Issues Scheme in Cloud Computing: A Survey SDM Satar, M Hussin, ZM Hanapi, MA Mohamed Int. J. Eng. Technol 7, 102-105, 2018 | 3 | 2018 |
Evaluation of user interface satisfaction for virtual Umrah among secondary school students WMW Isa, A Rozaimee, SDM Satar, NA Hamid, N Rahim, J Hashim, ... Advanced Science Letters 23 (5), 4149-4152, 2017 | 3 | 2017 |
3D virtual reality using 360 degree photography for umrah training N Rahim, WM Wan Isa, A Rozaimee, SD Mohd Satar, N Abd Hamid, ... 2ndInternational Conference on Islamic Applications in Computer Science And …, 2014 | 3 | 2014 |
SPAM DETECTION MODEL USING TENSORFLOW AND DEEP LEARNING ALGORITHM S Govindan, AFA Abidin, MA Mohamed, SDM Satar, MFA Kadir, ... Malaysian Journal of Computing and Applied Mathematics 6 (2), 11-21, 2023 | 2 | 2023 |
Heuristic evaluation of virtual Umrah to improve user experience NA Hamid, A Rozaimee, N Rahim, SDM Satar, WMW Isa, J Hashim, ... Advanced Science Letters 22 (10), 2918-2921, 2016 | 2 | 2016 |
Usability evaluation of virtual umrah based on user centered design from expert user view A Rozaimee, WMW Isa, N Abd Hamid, SDM Satar, N Rahim, J Hashim, ... Jurnal Teknologi 77 (19), 91-95, 2015 | 2 | 2015 |
INTRUSION DETECTION AND PREVENTION SYSTEM IN SME'S LOCAL NETWORK BY USING SURICATA P Veerasingam, S Abd Razak, AFA Abidin, MA Mohamed, SDM Satar Malaysian Journal of Computing and Applied Mathematics 6 (1), 21-30, 2023 | 1 | 2023 |
AN IMAGE STEGANOGRAPHY ALGORITHM BASED ON LOGICAL CONNECTIVE SDM Satar, NABD Hamid, F Ghazali, R Muda, MA Mohamed Journal of Theoretical and Applied Information Technology 94 (1), 45, 2016 | 1 | 2016 |
PASSWORD MANAGER SECURITY USING HONEY ENCRYPTION ALGORITHM AND HONEYPOT TECHNIQUE A Danial, MFA Kadir, AFA Abidin, MA Mohamed, NA Hamid, SDM Satar Malaysian Journal of Computing and Applied Mathematics 6 (2), 1-10, 2023 | | 2023 |
A SECURE ONLINE VOTING SYSTEM USING FACE RECOGNITION TECHNOLOGY N Abd Hamid, CDN Appunair, AFA Abidin, MA Mohamed, MFA Kadir, ... Malaysian Journal of Computing and Applied Mathematics 6 (1), 1-9, 2023 | | 2023 |