Mazleena Salleh

Orcid: 0000-0003-4741-8255

According to our database1, Mazleena Salleh authored at least 24 papers between 2009 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Polychronicity tendency-based online behavioral signature.
Int. J. Mach. Learn. Cybern., 2019

2017
Enhancing EAP-TLS authentication protocol for IEEE 802.11i.
Wirel. Networks, 2017

Routing protocols for underwater wireless sensor networks based on data forwarding: a review.
Telecommun. Syst., 2017

Routing protocols based on node mobility for Underwater Wireless Sensor Network (UWSN): A survey.
J. Netw. Comput. Appl., 2017

Adaptive memory-based single distribution resampling for particle filter.
J. Big Data, 2017

A Conceptual Model for Holistic Classification of Insider.
CoRR, 2017

Routing Protocols for Underwater Wireless Sensor Network Based on Location: A Survey.
Ad Hoc Sens. Wirel. Networks, 2017

Risk tolerance and trust issues in cloud-based E-learning.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

High-level online user attribution model based on human Polychronic-Monochronic tendency.
Proceedings of the 2017 IEEE International Conference on Big Data and Smart Computing, 2017

2016
An innovative privacy preserving technique for incremental datasets on cloud computing.
J. Biomed. Informatics, 2016

Feature selection for phishing detection: a review of research.
Int. J. Intell. Syst. Technol. Appl., 2016

Understanding Online Behavior: Exploring the Probability of Online Personality Trait Using Supervised Machine-Learning Approach.
Frontiers ICT, 2016

Wavelet-based Performance in Denoising ECG Signal.
Proceedings of the 8th International Conference on Signal Processing Systems, 2016

2015
Preventing collusion attack in android.
Int. Arab J. Inf. Technol., 2015

2014
Survey of anti-phishing tools with detection capabilities.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Biometric encryption to enhance confidentiality in Cloud computing.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Pixel-based dispersal scheme for medical image survivability and confidentiality.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

An enhanced certificateless cryptosystem for mobile ad hoc networks.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

JPEG mage encryption with Elliptic Curve Cryptography.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

A psychographic framework for online user identification.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

2013
Prime order elliptic curve generation methods: A review.
Proceedings of the 13th International Conference on Intellient Systems Design and Applications, 2013

2012
The Impact of E-Learning in Workplace: Focus on Organizations and Healthcare Environments.
Int. Arab. J. e Technol., 2012

Preventing TMTO Attack in AES-CCMP in IEEE 802.11i.
Proceedings of the Computer Networks - 19th International Conference, 2012

2009
Application of 2D Barcode in Hardcopy Document Verification System.
Proceedings of the Advances in Information Security and Assurance, 2009


  Loading...