Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Mohd Faizal Ab Razak"'
Publikováno v:
Iraqi Journal for Computer Science and Mathematics, Vol 4, Iss 4 (2023)
The Internet of Things (IoT) has transformed our interaction with the world by connecting devices, sensors, and systems to the Internet, enabling real-time monitoring, control, and automation in various applications such as smart cities, healthcare,
Externí odkaz:
https://doaj.org/article/ee7952741e4047a49f14e41af0c3632b
Publikováno v:
Egyptian Informatics Journal, Vol 24, Iss 1, Pp 27-42 (2023)
Distributed Denial of Service (DDoS) is a type of attack that leverages many compromised systems or computers, as well as multiple Internet connections, to flood targeted resources simultaneously. A DDoS attack's main purpose is to disrupt website tr
Externí odkaz:
https://doaj.org/article/63cc567c91264ea8bab605cd2040de93
Autor:
Sharfah Ratibah Tuan Mat, Mohd Faizal Ab Razak, Mohd Nizam Mohmad Kahar, Juliza Mohamad Arif, Ahmad Firdaus
Publikováno v:
ICT Express, Vol 8, Iss 3, Pp 424-431 (2022)
The unprecedented growth of mobile technology has generated an increase in malware and raised concerns over malware threats. Different approaches have been adopted to overcome the malware attacks yet this spread is still increasing. To combat this is
Externí odkaz:
https://doaj.org/article/e6fbb9775dde4623ac3f1bd44dee5349
Autor:
LAITH KADHUM, Ahmad Firdaus, Mohamad Fadli Bin Zolkipli, Syifak Izhar Hisham, Luhur Bayuaji, Mohd Faizal Ab Razak
Publikováno v:
Iraqi Journal for Computer Science and Mathematics, Vol 4, Iss 2 (2023)
The RADG (Reaction Automata Direct Graph) cryptosystem is the automata direct graph and reaction states combination. The classical RADG does not require key exchange (keyless), or agreement between users just the design of RADG, which is static. The
Externí odkaz:
https://doaj.org/article/0386fa6e3e904ccd93b953e988fa5ad8
Autor:
Rosmalissa Jusoh, Ahmad Firdaus, Shahid Anwar, Mohd Zamri Osman, Mohd Faaizie Darmawan, Mohd Faizal Ab Razak
Publikováno v:
PeerJ Computer Science, Vol 7, p e522 (2021)
Android is a free open-source operating system (OS), which allows an in-depth understanding of its architecture. Therefore, many manufacturers are utilizing this OS to produce mobile devices (smartphones, smartwatch, and smart glasses) in different b
Externí odkaz:
https://doaj.org/article/42a67b79785a440385b93f4b5957367c
Autor:
Juliza Mohamad Arif, Mohd Faizal Ab Razak, Suryanti Awang, Sharfah Ratibah Tuan Mat, Nor Syahidatul Nadiah Ismail, Ahmad Firdaus
Publikováno v:
PLoS ONE, Vol 16, Iss 9, p e0257968 (2021)
The evolution of malware is causing mobile devices to crash with increasing frequency. Therefore, adequate security evaluations that detect Android malware are crucial. Two techniques can be used in this regard: Static analysis, which meticulously ex
Externí odkaz:
https://doaj.org/article/351777d67fd942f180495755f102eae9
Publikováno v:
IEEE Access, Vol 6, Pp 5182-5198 (2018)
Software-defined networking (SDN) has emerged as an evolutionary paradigm in datacenter networks by separating data from control plane and centralizing network decision making. Traffic flow measurement in SDN is relatively lightweight in comparison t
Externí odkaz:
https://doaj.org/article/5b9524e573e8411cbb58b03f356761f0
Publikováno v:
PLoS ONE, Vol 13, Iss 6, p e0198884 (2018)
Product reviews are the individual's opinions, judgement or belief about a certain product or service provided by certain companies. Such reviews serve as guides for these companies to plan and monitor their business ventures in terms of increasing p
Externí odkaz:
https://doaj.org/article/a7187f73473c468482fa8ecbfbd865d1
Autor:
Nur Khairani Kamarudin, Ahmad Firdaus, Azlee Zabidi, Ferda Ernawan, Syifak Izhar Hisham, Mohd Faizal Ab Razak
Publikováno v:
Journal of Intelligent & Fuzzy Systems. 44:5601-5615
Many smart mobile devices, including smartphones, smart televisions, smart watches, and smart vacuums, have been powered by Android devices. Therefore, mobile devices have become the prime target for malware attacks due to their rapid development and
Autor:
Mohd Faizal Ab Razak, Mohd Nizam Mohmad Kahar, Juliza Mohamad Arif, Ahmad Firdaus, Sharfah Ratibah Tuan Mat
Publikováno v:
ICT Express. 8:424-431
The unprecedented growth of mobile technology has generated an increase in malware and raised concerns over malware threats. Different approaches have been adopted to overcome the malware attacks yet this spread is still increasing. To combat this is