Follow
Azuan Ahmad
Title
Cited by
Cited by
Year
Security risk assessment framework for cloud computing environments
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Security and Communication Networks 7 (11), 2114-2124, 2014
1052014
Graduate employability post-COVID-19: the case of a Malaysian public university
MIH Kamaruddin, A Ahmad, MA Husain, SN Abd Hamid
Higher Education, Skills and Work-Based Learning 11 (3), 710-724, 2021
392021
CloudIDS: Cloud intrusion detection model inspired by dendritic cell mechanism
A Ahmad, NB Idris, MN Kama
International Journal of Communication Networks and Information Security 9 …, 2017
192017
Image detection model for construction worker safety conditions using faster R-CNN
MM Saudi, AH Ma'arof, A Ahmad, ASM Saudi, MH Ali, A Narzullaev, ...
International Journal of Advanced Computer Science and Applications, 2020
142020
A new cryptojacking malware classifier model based on dendritic cell algorithm
A Ahmad, W Shafiuddin, MN Kama, MM Saudi
Proceedings of the 3rd International Conference on Vision, Image and Signal …, 2019
122019
Mobile application of food recommendation for allergy baby using rule-based technique
AA Shari, NA Pajar, N Sabri, MRM Noordin, FMI Zainudin, AS Shari, ...
2019 IEEE international conference on automatic control and intelligent …, 2019
102019
Traditional security risk assessment methods in cloud computing environment: usability analysis
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Jurnal Teknologi 73 (2), 85-89, 2015
102015
Danger theory based hybrid intrusion detection systems for cloud computing
A Ahmad, B Shanmugam, NB Idris, GN Samy
International Journal of Computer and Communication Engineering 2 (6), 650, 2013
102013
Enhancement and implementation of network access control architecture for virtualization environments
H Annuar, B Shanmugam, A Ahmad, NB Idris, SH AlBakri, GN Samy
2013 International Conference on Informatics and Creative Multimedia, 314-320, 2013
92013
A recent assessment for the ransomware attacks against the internet of medical things (iomt): A review
T Nusairat, MM Saudi, AB Ahmad
2023 IEEE 13th International Conference on Control System, Computing and …, 2023
82023
The development and application of the zakat collection blockchain system
KF Khairi, NH Laili, H Sabri, A Ahmad, VH Pham, MD Tran
Journal of Governance & Regulation, 2023
72023
A case study for the cloud computing security threats in a governmental organization
SH Albakri, B Shanmgam, GN Samy, NB Idris, A Ahmed
2014 International Conference on Computer, Communications, and Control …, 2014
72014
Modelling Fuel Cut Off Controller on CNG Engines Using Fuzzy Logic: A Prototype
S Munahar, M Setiyo, MM Saudi, A Ahmad, D Yuvenda
International Journal on Advanced Science, Engineering and Information …, 2022
62022
Detection of social media exploitation via SMS and camera
MA Azhar, MM Saudi, A Ahmad, AA Bakar
International Association of Online Engineering, 2019
62019
A Theoretical Comparative Analysis Of Dna Techniques Used In Dna Based Cryptography
NAN Abdullah, NH Zakaria, AH Ab Halim, FHM Ridzuan, A Ahmad, ...
Journal of Sustainability Science and Management, 2022
52022
Legal Issues In E-Wallet Practices
MZ Md Noor, A Mohamed Naim, NA Muhamed, AAI Mirza, A Ahmad, ...
UUM Journal of Legal Studies (UUMJLS) 12 (02), 229-252, 2021
52021
Cloud Computing Adoption Challenges
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Advanced Science Letters 20 (2), 546-548, 2014
52014
Crytojacking Classification based on Machine Learning Algorithm
WNABW Mansor, A Ahmad, WS Zainudin, MM Saudi, MN Kama
Proceedings of the 2020 8th International Conference on Communications and …, 2020
42020
Mobile malware classification based on phylogenetics
MM Saudi, S Sukardi, ASM Syafiq, A Ahmad, MA Husainiamer
International Journal of Engineering and Advanced Technology (IJEAT), 2019
42019
Cloud Co-residency denial of service threat detection inspired by artificial immune system
A Ahmad, WS Zainudin, MN Kama, NB Idris, MM Saudi
Proceedings of the 2018 Artificial Intelligence and Cloud Computing …, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20