Zobrazeno 1 - 10
of 129
pro vyhledávání: '"Udzir, Nur"'
Autor:
Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez Hj., Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah
Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protect
Externí odkaz:
http://arxiv.org/abs/2004.02543
Publikováno v:
International Journal of Computer Networks & Communications (IJCNC) Vol.11, No.4, July 2019
Sniffing is one of the most prominent causes for most of the attacks in the digitized computing environment. Through various packet analyzers or sniffers available free of cost, the network packets can be captured and analyzed. The sensitive informat
Externí odkaz:
http://arxiv.org/abs/1907.12735
Publikováno v:
In Egyptian Informatics Journal December 2022 23(4):177-191
Autor:
Isa, Mohd Anuar Mat, Mahmod, Ramlan, Udzir, Nur Izura, Manan, Jamalul-lail Ab, Jøsang, Audun, Tanha, Ali Dehghan
Publikováno v:
Journal of Current Research in Science, Issn 2322-5009, 4(2), 2016: 177-194
This publication presents a relation computation or calculus for international relations using a mathematical modeling. It examined trust for international relations and its calculus, which related to Bayesian inference, Dempster-Shafer theory and su
Externí odkaz:
http://arxiv.org/abs/1606.02239
Autor:
Isa, Mohd Anuar Mat, Mahmod, Ramlan, Udzir, Nur Izura, Manan, Jamalul-lail Ab, Tanha, Ali Dehghan
This paper presents a trust computation for international relations and its calculus, which related to Bayesian inference, Dempster Shafer theory and subjective logic. We proposed a method that allows a trust computation which is previously subjectiv
Externí odkaz:
http://arxiv.org/abs/1604.00980
Autor:
Hussien, Hassan Mansur, Yasin, Sharifah Md, Udzir, Nur Izura, Ninggal, Mohd Izuan Hafez, Salman, Sadeq
Publikováno v:
In Journal of Industrial Information Integration June 2021 22
The use of key-dependent shiftRows can be considered as one of the applied methods for altering the quality of a cryptographic algorithm. This article describes one approach for changing the ShiftRows transformation employed in the algorithm AES. The
Externí odkaz:
http://arxiv.org/abs/1502.03544
Publikováno v:
Mehran University Research Journal of Engineering & Technology; Jul2024, Vol. 43 Issue 3, p205-218, 14p
Publikováno v:
In Cyber Security and Applications December 2025 3