Rabiah Ahmad
According to our database1,
Rabiah Ahmad
authored at least 35 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Comput. Electr. Eng., 2024
2023
Peer Online Training (POT) as Learning Activity in Computer Security Audit and Risks Management Teaching Module.
Proceedings of the Knowledge Management in Organisations - 17th International Conference, 2023
2022
Comput. Electr. Eng., 2022
2021
An Emotion and Gender Detection Using Hybridized Convolutional 2D and Batch Norm Residual Network Learning.
Proceedings of the ICIT 2021: IoT and Smart City, Guangzhou, China, December 22 - 25, 2021, 2021
Proceedings of the 3rd International Cyber Resilience Conference, 2021
2018
Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers.
IACR Cryptol. ePrint Arch., 2018
CoRR, 2018
Inclination of Insider Threats' Mitigation and Implementation: Concurrence View from Malaysian Employees.
Proceedings of the Knowledge Management in Organizations - 13th International Conference, 2018
2017
Integrating information quality dimensions into information security risk management (ISRM).
J. Inf. Secur. Appl., 2017
2015
Collective information structure model for Information Security Risk Assessment (ISRA).
J. Syst. Inf. Technol., 2015
Inf. Secur. J. A Glob. Perspect., 2015
2014
2013
Transmission control Protocol Performance Comparison using Piggyback Scheme in WLANs.
J. Comput. Sci., 2013
A conceptual framework of info structure for information security risk assessment (ISRA).
J. Inf. Secur. Appl., 2013
Feature extraction from epigenetic traits using edge detection in iris recognition system.
Proceedings of the 2013 IEEE International Conference on Signal and Image Processing Applications, 2013
Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
Proceedings of the 9th International Conference on Information Assurance and Security, 2013
2012
J. Information Security, 2012
J. Information Security, 2012
Illicit Activities and Terrorism in Cyberspace: An Exploratory Study in the Southeast Asian Region.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012
Adopting a Knowledge Management Concept in Securing the Privacy of Electronic Medical Record Systems.
Proceedings of the 7th International Conference on Knowledge Management in Organizations: Service and Cloud Computing, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
Proceedings of the 2012 International Conference on Cyber Security, 2012
2011
Proceedings of the 7th International Conference on Information Assurance and Security, 2011
2010
Health Informatics J., 2010
Proceedings of the Advances in Computer Science and Information Technology, 2010
Safeguarding Malaysia's critical national information infrastructure (CNII) against cyber terrorism: Towards development of a policy framework.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
A framework for integrated risk management process using survival analysis approach in information security.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Proceedings of the Digital Forensics and Cyber Crime - First International ICST Conference, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Threats Identification in Healthcare Information Systems Using Genetic Algorithm and Cox Regression.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2004
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people.
Health Informatics J., 2004