Towards identifying usability and security features of graphical password in knowledge based authentication technique MD Hafiz, AH Abdullah, N Ithnin, HK Mammi 2008 Second Asia International Conference on Modelling & Simulation (AMS …, 2008 | 128 | 2008 |
Secured data storage framework for land registration using blockchain technology S Humdullah, SH Othman, MN Razali, HK Mammi 2021 3rd international cyber resilience conference (crc), 1-6, 2021 | 15 | 2021 |
Competency-based education (CBE) for IT security: towards bridging the gap HK Mammi, N Ithnin Proceedings of IEEE International Conference on Teaching, Assessment, and …, 2012 | 12 | 2012 |
A study on image security in social media using digital watermarking with metadata MAF bin Jeffry, HK Mammi 2017 IEEE conference on application, information and network security (AINS …, 2017 | 11 | 2017 |
An anti-shoulder surfing mechanism and its memorability test LK Seng, N Ithnin, H Mammi International Journal of Security and Its Applications 6 (5), 87-96, 2012 | 9 | 2012 |
User's Affinity of Choice: Features of Mobile Device Graphical Password Scheme's Anti-Shoulder Surfing Mechanism LK Seng, N Ithnin, HK Mammi International Journal of Computer Science Issues (IJCSI) 8 (4), 255, 2011 | 7 | 2011 |
Timetable scheduling system using genetic algorithm for school of computing (tsuGA) HK Mammi, LY Ying International Journal of Innovative Computing 11 (2), 67-72, 2021 | 4 | 2021 |
Cyber security awareness game (CSAG) for secondary school students LW Shen, HK Mammi, MM Din 2021 International Conference on Data Science and Its Applications (ICoDSA …, 2021 | 4 | 2021 |
To share or not to share: Tabayyun made possible with MyVeri5 M Ghazali, SA Razak, M Salleh, HK Mammi, IF Isnin Advanced Science Letters 23 (5), 4542-4545, 2017 | 4 | 2017 |
Identifying the Reusability of the Triangle and Intersection Schemes on Mobile Devices LK Seng, N Ithnin, HK Mammi Computer and Information Science 4 (4), 109, 2011 | 4 | 2011 |
Graphical password: User’s affinity of choice—an analysis of picture attributes selection MDHB Abdullah, AHB Abdullah, N Ithnin, HK Mammi 2008 International Symposium on Information Technology 3, 1-6, 2008 | 4 | 2008 |
An improved blockchain technique for secure land registration data records S Humdullah, SH Othman, MN Razali, HK Mammi, R Javed International Journal of Innovative Computing 11 (2), 89-94, 2021 | 3 | 2021 |
Evaluation of business continuity plan maturity level using business continuity maturity model H Haidzir, SH Othman, HK Mammi International Journal of Innovative Computing 8 (1), 2018 | 3 | 2018 |
Lightweight symmetric encryption algorithm in big data M Bakhtiari, A Zainal, S Bakhtiari, HK Mammi Int. J. Advance Soft Compu. Appl 7 (3), 2015 | 3 | 2015 |
A Development of Headwater Phenomenon Warning and Monitoring System MAM Kameel, IF Isnin, RZRM Radzi, MS Abd Latiff, KA Bakar, HK Mammi, ... 2020 IEEE 5th International Symposium on Telecommunication Technologies …, 2020 | 1 | 2020 |
Study on the effectiveness of securing instant messaging using one time pad A Arifin, HK Mammi Int. J. Adv. Soft Comput. Appl 6 (1), 2014 | 1 | 2014 |
Sistem Pengurusan Sijil Halal Menggunakan RFID N Utheyakumar Universiti Teknologi Malaysia, 2009 | 1 | 2009 |
Sistem Kawalan Inventori Makmal Komputer Menggunakan RFID MF ABDULLAH Universiti Teknologi Malaysia, 2008 | 1 | 2008 |
Sistem Pengurusan PSM II Jabatan SKK Secara Atas Talian R MAT ADAM Universiti Teknologi Malaysia, 2008 | 1 | 2008 |
Sistem Temujanji Bersama Doktor Berasaskan Aplikasi Web Dan Perkhidmatan Pesanan Ringkas (SMS) MK JEDRIS Universiti Teknologi Malaysia, 2007 | 1 | 2007 |