Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Mohd Nazri Kama"'
Autor:
Shidrokh Goudarzi, Mohd Nazri Kama, Mohammad Hossein Anisi, Seyed Ahmad Soleymani, Faiyaz Doctor
Publikováno v:
Sensors, Vol 18, Iss 10, p 3459 (2018)
To assist in the broadcasting of time-critical traffic information in an Internet of Vehicles (IoV) and vehicular sensor networks (VSN), fast network connectivity is needed. Accurate traffic information prediction can improve traffic congestion and o
Externí odkaz:
https://doaj.org/article/1904d817cd414e1a9f79343f4da19f6a
Autor:
Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Norbik Bashah Idris, Madihah Mohd Saudi, Nur Hafiza Zakaria
Publikováno v:
International Journal of Communication Networks and Information Security (IJCNIS). 10
The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it al
Publikováno v:
International Journal of Electrical and Electronic Engineering & Telecommunications. :188-193
The term Cloud computing is not new anymore in computing technology. This form of computing technology previously considered only as marketing term, but today Cloud computing not only provides innovative improvements in resource utilisation but it al
Autor:
Madihah Mohd Saudi, Azuan Ahmad, Wan Shafiuddin Zainudin, Mohd Nazri Kama, Wan Nur Aaisyah Binti Wan Mansor
Publikováno v:
Proceedings of the 2020 8th International Conference on Communications and Broadband Networking.
The rise of cryptocurrency has resulted in a number of concerns. A new threat known as cryptojacking" has entered the picture where cryptojacking malware is the trend for future cyber criminals, who infect computers, install cryptocurrency miners, an
Autor:
Mohd Nazri Kama, Seyed Ahmad Soleymani, Sh. Goudarzi, H.M. Rusli, M. Khurram Khan, Mohammad Hossein Anisi
Publikováno v:
Ad Hoc Networks. :102634
Publikováno v:
Advanced Science Letters. 23:5506-5510
Highly critical authentication in Grid Computing systems required secured data transmission to be protected from unintended user and free modification. The process of protecting data from unauthorized user known as cryptography while protecting the u
Autor:
Othman Mohd Yusop, Nur Farhana Binti Abdul Kadir, Mohd Nazri Kama, Haslina Md Sarkan, Azri Azmi
Publikováno v:
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS).
Software effort estimation (SEE) predicts the amount of effort needed to develop software and this information is important for a project manager to make good decisions when confronted with requirement change requests during the development. However,
Autor:
Mohd Nazri Kama, Poon Ai Phin, Othman Mohd Yusop, Nurfarahin Mohmad, Mohd Nizam Zakaria, Saiful Adli Ismail
Publikováno v:
2019 6th International Conference on Research and Innovation in Information Systems (ICRIIS).
Penetration testing or pen test is a simulated cyber-attack conducted to find the vulnerabilities and weaknesses in a computer system. The test is conducted by professionals hired by the organization that produces a report to the organization for fur
Publikováno v:
ICVISP
Customer churn is one of the main problems in telecommunication industry. This study aims to identify the factors that influence customer churn and develop an effective churn prediction model as well as provide best analysis of data visualization res
Publikováno v:
ICVISP
A new threat known as "cryptojacking" has entered the picture where cryptojacking malware is the future trend for cyber criminals, who infect victim's device, install cryptojacking malware, and use the stolen resources for crytocurrency mining. Worse