Follow
Sameer Hasan Saif Albakri
Sameer Hasan Saif Albakri
Faculty of Computer and Information Technology, Sana'a University
Verified email at live.utm.my
Title
Cited by
Cited by
Year
Security risk assessment framework for cloud computing environments
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Security and Communication Networks 7 (11), 2114–2124, 2014
1052014
Design and develop a video conferencing framework for real-time telemedicine applications using secure group-based communication architecture
ML Mat Kiah, SH Al-Bakri, AA Zaidan, BB Zaidan, M Hussain
Journal of medical systems 38, 1-11, 2014
932014
Meeting the Security Requirements of Electronic Medical Records in the ERA of High-Speed Computing
HO Alanazi, AA Zaidan, BB Zaidan, MLM Kiah, SH Al-Bakri
Journal of Medical Systems 39 (1), 2014
792014
A review of audio based steganography and digital watermarking
ML Mat Kiah, BB Zaidan, AA Zaidan, A Mohammed Ahmed, SH Al-Bakri
International Journal of Physical Sciences 6 (16), 3837-3850, 2011
772011
Securing peer-to-peer mobile communications using public key cryptography: New security strategy
SH Al-Bakri, MLM Kiah, AA Zaidan, BB Zaidan, GM Alam
International Journal of Physical Sciences 6 (4), 930-938, 2011
662011
Digital forensic challenges in the cloud computing environment
G Narayana Samy, B Shanmugam, N Maarop, P Magalingam, S Perumal, ...
Recent Trends in Information and Communication Technology: Proceedings of …, 2018
152018
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
SH Al-bakri, M. L. MatKiah
Scientific Research and Essays 2 (22), 2010
142010
Danger Theory Based Hybrid Intrusion Detection Systems for Cloud Computing
SHAB Azuan Ahmad, Bharanidharan Shanmugam, Norbik
International Journal of Computer and Communication Engineering 2, 650-654, 2013
122013
Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Jurnal Teknologi 73 (2), 85–89, 2015
102015
Traditional Security Risk Assessment Methods in Cloud Computing Environment: Usability Analysis
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
IRICT 2014, 483-495, 2014
102014
Enhancement and implementation of network access control architecture for virtualization environments
H Annuar, B Shanmugam, A Ahmad, NB Idris, SH AlBakri, GN Samy
2013 International Conference on Informatics and Creative Multimedia, 314-320, 2013
92013
Transformative cyber security model for Malaysian government agencies
S Perumal, SA Pitchay, GN Samy, B Shanmugam, P Magalingam, ...
International Journal of Engineering and Technology (UAE), 2018
72018
A Case Study for the Cloud Computing Security Threats in a Governmental Organization
SH Albakri, B Shanmgam, GN Samy, NB Idris, A Ahmed
2014 International Conference on Computer, Communication, and Control Technology, 2014
72014
An implementation of secure group communication in a wireless environment
MLM Kiah, B Daghighi
International Journal of Computer and Electrical Engineering 4 (6), 850, 2012
62012
Cloud Computing Adoption Challenges
SH Albakri, B Shanmugam, GN Samy, NB Idris, A Ahmed
Advanced Science Letters 20 (2), 546-548, 2014
52014
Digital forensic investigation challenges based on cloud computing characteristics
GN Samy, N Maarop, MS Abdullah, S Perumal, SH Albakri, ...
International Journal of Engineering and Technology (UAE) 7 (4.15), 7-11, 2018
42018
Information security risk assessment framework for cloud computing environment using medical research design and method
GN Samy, B Shanmugam, N Maarop, P Magalingam, S Perumal, ...
Advanced Science Letters 24 (1), 739-743, 2018
42018
Novel risk assessment method to identify information security threats in cloud computing environment
G Narayana Samy, SH Albakri, N Maarop, P Magalingam, DHT Wong, ...
Recent Trends in Data Science and Soft Computing: Proceedings of the 3rd …, 2019
22019
Proposed proactive digital forensic approach for cloud computing environment
GN Samy, N Maarop, D Hooi-Ten Wong, FA Rahim, NH Hassan, ...
Int. J. Eng. Technol 7 (4), 12-15, 2018
22018
Security model for Microsoft based mobile sales management application in private cloud computing
KC Houng, B Shanmugam, GN Samy, SH Albakri, A Ahmad
International Journal of Cloud Computing and Services Science 2 (3), 159, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20