Social Items

Noor Afiza Mohd Ariffin Research

It has become one of the most basic security requirements for network communication. Noor Afiza Mohd Ariffin.


Pdf Vulnerabilities Detection Using Attack Recognition Technique In Multi Factor Authentication

By telkomnika journal noor afiza binti mohd ariffin fsktm aziah binti asmawi fsktm and zul-azri ibrahim Authentication is one of the essentials components of information security.

Noor afiza mohd ariffin research. To cite this article. Today there is a necessity for a strong level of authentication to guarantee a. This research proposes a data reduction model DIFReM and a tool which will not only help the investigator in identifying modified system files but also has the ability to detect files inserted into system directories and also be able to verify integrity using hashing to provide the investigator with a more effective and efficient digital forensics tools.

Noor Afiza Mohd Ariffin Noor Fazlida Mohd Sani 11 P a g e Global Journal of Engineering and Technology Review. The advent of the digital. Design of Object-Oriented Debugger Model by Using Unified Modeling Language Nor Fazlida Mohd Sani 1 Noor Afiza Mohd Ariffin 1 and Rodziah Atan 1.

Digital Object Identifier DOI. Semantic Scholar profile for undefined with 11 scientific research papers. Thus the subject of this research is to focus on the security of the authentication process.

Noor Afiza Mohd Ariffin. A Compendium Volume 2 Photo Acoustic and Optical Coherence Tomography Imaging Volume 3. The underutilization of mental health services is a very real problem as many who might benefit from care do not receive itIn the United States this trend has been documented in several studies with minorities such as African Americans Alvidrez 1999 Latinos Alvidrez 1999 Asian Americans Kim Omizo 2003 and American Indians Beals et al 2005.

Noor Afiza Ariffin Mohd and Aymen Yousef Ahmed Ashawesh 2021 J. Noor Afiza Mohd Ariffin et al 2021 J. Although it is complex its still one of the popular.

1793 012047 View the article online for updates and enhancements. Siti Naimah Shamsudin Mohd Hezri Fazalul Rahiman Mohd Nasir Taib Wan Razarinah Wan Abdul Razak Azizah Hanom Ahmad and Maizatulikhma Mat Zain. 1 University Putra Malaysia Malaysia.

Search terms are case-insensitive. Debugging on computer program is a complex cognitive activity. Research Article Open Access.

Survey and Open Issues. Eg education OR research. Nor Fazlida Mohd Sani.

Langkawi Malaysia 16-17 July 2017 IEEE Catalog Number. Computer Science and Information Technology In todays world security plays an important role in many authentication applications. Noor ARIFFIN Senior Lecturer Cited by 6 of Universiti Putra Malaysia Putrajaya UPM Read 9 publications Contact Noor ARIFFIN.

Volume 2 Issue 1 2020. In the past decade the inevitable increase in temperature has caused Malaysia to experience more extreme heat events and yet very little research has been dedicated in exploring the heat-related. Semantic Scholar profile for undefined with 5 scientific research papers.

NOOR AFIZA MOHD ARIFFIN October 2017 Chairman. Article Published in International. PDF On Aug 1 2020 Noor Afiza Mohd Ariffin and others published Vulnerabilities detection using attack recognition technique in multi-factor authentication Find read and cite all the.

Semantic Scholar profile for Noor Fazamimah Mohd Ariffin with 4 highly influential citations and 44 scientific research papers. International Journal of Undergraduate Research. Associate Professor Nor Fazlida Mohd Sani PhD Faculty.

Semantic Scholar profile for undefined with 5 scientific research papers. IOP Publishing Nanofabrication Nanolithography techniques and their applications. Hence this research proposes a new multi-factor authentication scheme that can withstand attacks based on user behavior and maintaining optimum.

By default only articles containing all terms in the query are returned ie AND is implied. To cite this article. 1793 012047 View the article online for updates and enhancements.

Modern era information sharing is boundless and becoming much easier to access with. Noor Afiza Mohd Ariffin et al 2021 J. 1793 012066 View the article online for updates and enhancements.

Mohamad Hafiz Bin Hamzan Siti Nurulain Binti Mohd Rum Noor Afiza Mohd Ariffin Aziah Asmawi Nor Azura Husin. Combine multiple words with OR to find articles containing either term. 03 4 10 18 2018 to prevent any unwanted forgery and unauthorized access to sensitive data.

Authentication is one of the essentials components of information security. Highly Influential Citations 0. Skip to search form Skip to main content Skip to account menu.

CFP1739N-POD 978-1-5090-3036-1 2017 International Conference on Research and Innovation. Imaging Modalities for Biological and Preclinical Research. To cite this article.

Use parentheses to create more complex queries. Noor Afiza Mohd Ariffin Akram Abduljabbar Abdulhalem and Nor Azura Husin. System Graduate Research Colloquium ICSGRC 2016.

It has become one of the most basic security requirements for network communication. Common words are ignored. You may also like A Strategy of Encryption and Decryption based in a Low Memory Environment Danzhi Wang Zepeng Wu and Yansong Cui-Implementation of advanced encryption.

Phishing Image Spam Classification Research Trends. Mohd Yunus Bin Sharum. Eg archive journal OR conference NOT theses.

1NOOR AFIZA MOHD ARIFFIN 2NOR FAZLIDA MOHD SANI 3ZURINA HANAPI 4RAMLAN MAHMOD 1234 Faculty of Computer Science and Information Technology Universiti Putra Malaysia UPM 43400 Serdang Selangor Malaysia. AFIZA MOHD ARIFFIN 1TEH NORANIS MOHD ARIS 1 Intelligent Computing Research Group Faculty of Computer Science and Information Technology Universiti Putra Malaysia Malaysia 2 Institute of Tropical Agriculture and Food Security Universiti Putra Malaysia Malaysia 3 Security Computing Research Group Faculty of Computer Science and Information. Inda Ishadah Nazrul Azha Noor Elaiza Abdul Khalid Afiza Ismail Norzehan Sakamat and Rosmah Abdul Latif.


Nur Afizah Muhamad Arifin


Show comments
Hide comments

No comments